Linkup maintains a comprehensive set of security and operational policies as part of our Information Security Management System (ISMS). These policies are regularly reviewed and updated to reflect current best practices and regulatory requirements. Policy documentation is available upon request for qualified prospects and clients.Documentation Index
Fetch the complete documentation index at: https://docs.linkup.so/llms.txt
Use this file to discover all available pages before exploring further.
Core security policies
| Policy | Description |
|---|---|
| Information Security Policy | Defines governance, security objectives, risk management framework, and responsibilities for protecting company and client assets. |
| Data Classification & Handling Policy | Establishes classification levels (Public, Internal, Confidential, Restricted) and handling, storage, transmission, and disposal requirements. |
| Access Control Policy | Covers user access management, RBAC, privileged access, access review procedures, and account lifecycle management. |
| Incident Response & Management Policy | Procedures for detecting, reporting, responding to, and recovering from incidents; includes notification timelines and escalation. |
| Business Continuity & Disaster Recovery Policy | Strategies and procedures to maintain operations during disruptions and recover systems/data (defined RTOs/RPOs). |
| Data Retention & Deletion Policy | Retention periods by data type; secure disposal procedures, including Zero Data Retention (ZDR) capabilities. |
| Change Management Policy | Processes for planning, testing, approving, and implementing changes to minimize risk and maintain stability. |
| Vulnerability Management Policy | Identification, assessment, prioritization, and remediation via scanning, pen testing, and patching with SLAs by severity. |
| Backup & Recovery Policy | Backup frequency, retention, storage, encryption, and testing to ensure recoverability. |
| Vendor & Third-Party Risk Management Policy | Requirements to assess, onboard, and monitor vendors/service providers against security and compliance standards. |
| Acceptable Use Policy | Appropriate and prohibited use of Linkup systems, data, and resources by employees and authorized users. |
| Encryption & Cryptography Policy | Encryption standards for data at rest/in transit, key management procedures, and approved algorithms/protocols. |
Additional policies
Additional specialized policies covering physical security, human resources security, network security, secure development, privacy management, and other areas are maintained as part of our comprehensive ISMS and are available upon request.Accessing policy documents
To request specific policies or attestations, contactsupport@linkup.so.