AI Policy
Check Point’s AI Policy sets the principles and guidelines governing the responsible use of generative artificial intelligence (AI) within Check Point’s operations. This policy outlines how AI technologies are developed, deployed, and managed to align with ethical standards, legal requirements, and industry best practices. It includes directives on data handling, privacy considerations, transparency in AI decision-making processes, and the accountability mechanisms in place to ensure AI tools are used by Check Point fairly, securely and in compliance with the applicable laws and regulations. The policy also emphasizes the importance of ongoing training for employees on AI ethics and safety. By implementing these guidelines, Check Point ensures its AI applications enhance cybersecurity solutions without compromising the trust or safety of users and stakeholders.
Information Security Measures Policy
Check Point’s Information Security Measures Policy provides a comprehensive framework for protecting the integrity, availability, and confidentiality of data across the organization. The policy outlines the security practices and controls that are implemented to prevent unauthorized access, data breaches, and other cyber threats. It details the technical and organizational measures Check Point employs, including secure network architectures, data encryption, access control procedures, and regular security assessments. Additionally, the policy addresses employee responsibilities and training in security best practices to ensure that all staff members are equipped to maintain and enhance Check Point’s security posture. This policy is aimed to assure that the required security measures are being taken to safeguard the data processed by Check Point, including of its customers, business partners, suppliers and employees, against evolving cyber threats.
Personal Data Breach Policy
Check Point’s Personal Data Breach Policy provides a framework for managing data security breaches that affect personal data held, stored, or processed by Check Point. The policy defines the responsible stakeholders to manage suspected privacy breach events, the required measures to assess, investigate and rectify and such events, as well as the required process to issue notifications per the applicable data protection laws and regulations.
Physical Security Policy
Check Point’s Physical Security Policy outlines the measures and protocols in place to ensure the physical safety of Check Point’s facilities, hardware, and personnel. This policy describes the security controls implemented to prevent unauthorized physical access to Check Point’s buildings and on-prem equipment and other critical infrastructure.
Firewall and Network Access Policy
Check Point’s Firewall and Network Access Policy outlines the protocols and guidelines for managing and securing Check Point’s network infrastructure.
Business Continuity and Disaster Recovery Plan
Check Point’s Business Continuity Management Disaster Recovery Plan establishes the framework for designing and building business continuity management capabilities, enabling Check Point to effectively respond to and recover from disruptions to critical business operations. This involves developing strategies to manage risks related to staff, locations, third parties, and technology.
Risk assessments and business impact analyses are carried out on an ongoing basis to gauge the financial, operational, regulatory, and reputational impacts of potential outages over various time frames.
Data Subjects Rights Procedure
Check Point’s Data Subject Rights Procedure outlines Check Point’s practice in addressing data subject request per the applicable data protection laws and regulations. The procedure details how individuals can exercise their rights regarding their personal data. This includes the process for submitting requests for access, correction, deletion, or portability of data, along with the necessary steps for identity verification, the timeframe for responses and required process to follow and implement such requests. The procedure also covers how Check Point handles complaints about data management. This comprehensive approach helps Check Point to efficiently address data subject requests within timely manner and in accordance with the applicable laws and regulations.
Vendors Information Security Assessment Policy
Check Point’s Vendors Information Security Assessment Policy is meant to implement controls that mitigate information security risks related to third-party vendors and to mandate the assessment and management of these risks.
Acceptable Use Policy
Check Point’s Acceptable Use Policy outlines the appropriate use of Check Point’s technical resources, such as desktop and portable computer systems, internet and web access, instant messaging, and any other electronic communication. These guidelines are established to mitigate potential security risks by preventing improper use of IT tools.
Mobile Security Policy
As mobile devices are increasingly integrated into both our business and personal lives, the risk of attacks grows. Attackers try to exploit this dual-use nature, targeting businesses operations. Check Point’s Mobile Security Policy is meant to establish a comprehensive security framework for the use of smartphones, tablets, and similar personal mobile devices within Check Point.
Vulnerability Disclosure Policy
Check Point’s Vulnerability Disclosure Policy provides security researchers with clear guidelines for conducting vulnerability discovery activities and conveys Check Point’s guidelines and authorization for submitting discovered vulnerabilities to Check Point.