Security & Compliance
At Unifonic, safeguarding customer data is paramount.
Internationally recognized cybersecurity standards and best practices, including ISO 27001, ISO 27017, ISO 27018, CSA STAR Level 2, and SOC 2 Type I and II, are meticulously followed to demonstrate dedication to robust information security management systems. These certifications and best practices ensure alignment with ISO standards and reflect a commitment to meeting CST requirements.
ISO 27001 - Information Security Management System (ISMS)
An internationally recognized standard for establishing, implementing, and improving an ISMS, ensuring sensitive information's confidentiality, integrity, and availability.
ISO 27017 - Cloud Security
ISO 27017 extends ISO 27001 to address cloud-specific security controls, guiding secure cloud service implementation and operation.
ISO 27018 - Personally Identifiable Information (PII) Protection in Public Clouds
ISO 27018 focuses on PII protection in public cloud environments, emphasizing privacy and security for personal data.
CSA STAR Level 2 - Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR) Level 2
CSA STAR Level 2 certification highlights our firm commitment to maintaining the security and integrity of our cloud services. This certification not only sets us apart in the market but also enhances our reputation as a secure and trustworthy organization.
SOC 2 Type I and II - Service Organization Control Reports
Independent auditors issue SOC 2 reports and evaluate an organization's controls related to security, availability, processing integrity, confidentiality, and customer data privacy. SOC 2 Type I focuses on the design of controls, while SOC 2 Type II evaluates their effectiveness over time.
Comprehensive Information Security Management System (ISMS) Coverage
Spanning key areas such as Policies, Assets, Access, Cryptography, Operations, Communication, Physical Security, Business Continuity, HR, Product, Cloud Security, Supplier Relations, Vulnerability Management, and Incident Response.
Security Governance
A robust security governance framework aligns policies and procedures with industry best practices, establishing a solid foundation for data protection.
Business Resilience
Ensuring service continuity and data safety in the face of unexpected disruptions.
DevSecOps
Seamlessly integrating security throughout development, enabling proactive vulnerability identification and resolution.
Threat and Risk Assessment
Ongoing risk assessments proactively address security threats and vulnerabilities, reinforcing defence mechanisms against evolving risks.
Cyber Defense
Employing cutting-edge cybersecurity technologies and strategies to defend against evolving threats, keeping data safe from cyberattacks
Transparent Policy Management
Ensuring transparency and accountability, information security policies and standards undergo annual management team review and approval.
Security Validation
Continuous monitoring and at least annual penetration testing provide real-time incident detection and vulnerability identification for added security.
Audit and Compliance
Regular, thorough audits confirm adherence to industry standards and regulations, assuring peace of mind.
Telecom regulators
Telecom regulators issue policies to safeguard the public interest. Operators, service providers, and senders of business messages need to remain compliant. Unifonic is a licensed service provider with the CST in KSA and is highly familiar with the regulatory environment. We place a high focus on security and compliance with local regulations.
Anti-spam Regulations
Regulators have anti-SPAM requirements in place to reduce SPAM messages. Here are the key requirements businesses need to be aware of when sending promotional messages and how we help.
SMS Compliance
When it comes to sending SMS messages, businesses need to comply with a number of requirements related to message classification, timing and more. Unifonic is a licensed service provider with CST in KSA.
Privacy Policy
Our privacy statement outlines the details around how we protect the individual's privacy while handling information that can be directly or indirectly identified as ‘personal data’.
Terms of Use
In our commitment to complete transparency, we offer visibility into our service terms and conditions of use.
Cookie Policy
Please read this cookie policy carefully, as it contains important information on who we are and how we use cookies on our website. This policy should be read together with our Privacy Policy, which sets out how and why we collect, store, use and share personal information generally, as well as your rights in relation to your personal information and details of how to contact us and supervisory authorities if you have a complaint.