Providing an online infrastructure for communication and security comes with great responsibility. Ensuring the availability, integrity and confidentiality of our platform is our top priority
As a key supplier in an industry that is rapidly evolving, CM is always looking to combine flexibility without compromising on security, availability or compliance when securing customer data.
Let us help you secure your online environment.
General Data Protection Regulation
On May 25th 2018, the General Data Protection Regulation (GDPR) came into effect, replacing current privacy regulations. As off 25 May 2018 all companies handling personal data will need to adhere to the regulation and be able to demonstrate their compliance to the GDPR.
As a responsible processor and a responsible controller, CM has embraced the principles that lie at the base of the GDPR. Moreover, we regularly revisit them to assure our compliance. We have all necessary tools in place to conform to the principle of accountability. Some examples are: Privacy by design, a data controller register, data processor registers, and our specific Data Privacy Impact Assessment (DPIA). We follow data privacy principles in the development of all our services.
In addition, we have set up a GDPR compliance roadmap and took corrective actions where necessary. We updated our terms and conditions in April 2018 to comply with the upcoming GDPR and the processing of personal information by CM. In updating our terms and conditions, processes and services, CM ensures that we provide you with a service that is compliant, and takes into account the latest regulations, techniques and functionalities in mobile messaging, voice, payments and digital identification.
In order to meet this goal, CM takes several measures:
With staff on-site 24/7/365, our analysts are continuously monitoring security, performance and connections to suppliers and customers from our Network Operations Center (NOC) - our team is equipped to handle any incident effectively and efficiently.
CM's services are hosted on privately owned and operated environments, giving us full control over all data, including its transport, encryption and accessibility. Usage of cloud services provided by third parties in the office environment is regulated by a specific cloud policy. Meaning only use of services contracted and approved by CM are allowed.
CM’s cloud is built upon standardised hardware and appliances. Blueprints are available per vendor and model, each containing CM’s default configuration and required steps for initialisation and installation. All of these blueprints are based on input from organisations such as CIS and NIST.
CM clearly distinguishes core processing components and services that are built on top of these components. Standardising and securing these core components, as well as our clients’ data is our first priority.
CM combines the results of real-time monitoring by our NOC, scheduled testing by our internal auditing department and external testing by renowned third parties to improve our infrastructure, coding practices, overall security and the effectivity of our monitoring processes.
CM has an extensive integrated management system in place. This management system covers items such as information security, risk management, disaster recovery, business continuity, backups, privacy, quality management and our environmental impact.
CM actively follows relevant changes in legal and compliance requirements, with extensive focus on GDPR regulations & POPI compliance.
CM monitors information security feeds published by various renowned institutes and firms such as NIST and the Open Web Application Security Project.
Security is a high priority for every team within CM. Clear security guidelines are available and all team members are briefed on their responsibilities to continuously contribute to the security of CM, its partners and customers.
At CM, we actively stimulate the exchange of security and secure coding related knowledge after gaining new insights based on (external) training, publications or recent events.