Legal Notice
Last updated:
May 29, 2025
Kili Technology’s security practices are multidimensional and reflect the different ways in which Kili Technology interacts with its customers
Corporate governance
- Human Resources: personnel are made aware of security
- Information and asset classification: information and assets are classified according degree of confidentiality
- Incident Management: Kili Technology respond to events that create suspicions of unauthorized data access or processing
- Risk management resiliency program: Kili Technology has a business continuity and disaster recovery plan
Kili’s information security practices
- Access control: policies and procedures are in place to govern access to and use of data and resources
- Network communications security: Kili has guidelines to manage network security
- Data Security: Kili has guidelines designed to protect the confidentiality, integrity and availability of data
- Laptops: anti-malware, updates and encryption are required
- Physical and environmental: controls protect Kili assets, personnel and infrastructure
- Communications and operations management: role-based access are in place
- Supply chain security: supply chain risk is monitored
Secure Development
- Programming Standards: Roadmap, training and guidance for developers are in place to produce secure code
- Security analysis and testing: testing is performed, including functional, static and dynamic analysis
- Ethical hacking: operational security analysis and penetration testing are run on a regular basis
- Secure configuration: Kili Technology products and services must be secure by default