{"id":10110007,"date":"2022-02-15T08:20:24","date_gmt":"2022-02-15T13:20:24","guid":{"rendered":"https:\/\/www.erbessd-instruments.com\/?page_id=10110007"},"modified":"2025-04-29T16:41:30","modified_gmt":"2025-04-29T21:41:30","slug":"data-security-and-it-security-statement","status":"publish","type":"page","link":"https:\/\/www.erbessd-instruments.com\/de\/data-security-and-it-security-statement\/","title":{"rendered":"DATA SECURITY AND IT SECURITY STATEMENT"},"content":{"rendered":"<p><b style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 17px;\">ERBESSD INSTRUMENTS (EI)<\/b> systems and data are protected by a comprehensive Information Security program detailed in the <b style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 17px;\">ERBESSD INSTRUMENTS <\/b>Security Management System (EISMS). Dedicated security, privacy, information governance, and compliance professionals maintain the program with oversight provided by the Board of Directors in conjunction with senior leadership. <b style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 17px;\">ERBESSD INSTRUMENTS<\/b> Security team conducts risk assessments, performs regular risk reviews, and tracks risks using a documented risk-register process.<\/p>\n<p><b>ERBESSD INSTRUMENTS<\/b> Security program supports the following frameworks; NIST Cybersecurity Framework, NIST SP 800-171 for the Protection of Controlled Unclassified Information in Non-Federal Information Systems and Organizations, the EU General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).<\/p>\n<p>Exponent has established policies that cover:<\/p>\n<p><strong>Acceptable Use Policies<\/strong><\/p>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td colspan=\"1\" rowspan=\"1\" valign=\"top\">\n<ul>\n<li>Remote Access<\/li>\n<li>Passwords<\/li>\n<li>Digital Systems Use<\/li>\n<\/ul>\n<\/td>\n<td colspan=\"1\" rowspan=\"1\" valign=\"top\">\n<ul>\n<li>Mobile Device<\/li>\n<li>Wireless Communication<\/li>\n<li>Privacy Policy<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Security Policies<\/strong><\/p>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td colspan=\"1\" rowspan=\"1\" valign=\"top\">\n<ul>\n<li>Information Security<\/li>\n<li>Security Incident Reporting<\/li>\n<li>Data Backup<\/li>\n<li>Information Sensitivity<\/li>\n<li>Premises Security and Data Center Operations<\/li>\n<\/ul>\n<\/td>\n<td colspan=\"1\" rowspan=\"1\" valign=\"top\">\n<ul>\n<li>Cloud Services<\/li>\n<li>Systems Acquisition and Deployment<\/li>\n<li>Change Management<\/li>\n<li>Supplier and Third-Party Relations<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Access Controls<\/strong><\/p>\n<p>Access and processing capabilities are limited to authorized users and authorized devices. A unique user ID with a complex password is assigned to authorized users and is required to login. Passwords are required to be changed frequently. Two-factor authentication is required for remote access and access to cloud systems. Administrative functions are facilitated through separate privileged accounts.<\/p>\n<p><strong>Architecture<\/strong><\/p>\n<p><b>EI<\/b> follows best practice for the deployment and maintenance of its systems and for data maintained within <b>EI<\/b> datacenters and cloud services. Critical data and systems are replicated and backed up to secondary datacenters. Systems are securely designed and are reviewed by the security team before being put into production.<\/p>\n<p><strong>Audit<\/strong><\/p>\n<p><b>EI&#8217;s<\/b>&nbsp;Information Security program is regularly audited both internally and externally on an annual basis. <b>EI<\/b> monitors and audits its security, privacy and information governance (people, processes and controls) to ensure compliance with policies and applicable security\/privacy standards. <b>EI<\/b> conducts an independent external penetration test annually and regularly scans its external and internal networks for vulnerabilities.<\/p>\n<p><strong>Awareness and Education<\/strong><\/p>\n<p><b>EI<\/b> employees, including contractors with <b>EI<\/b> system credentials, complete regularly assigned security awareness training and receive phishing training exercises. Security bulletins and announcements are shared throughout the year to give timely reinforcement reminders for awareness and education.<\/p>\n<p><strong>Business Continuity &amp; Disaster Recovery<\/strong><\/p>\n<p><b>EI<\/b> maintains a business continuity &amp; disaster recovery plan that is regularly reviewed and tested. <b>EI<\/b> continuity and recovery considerations include the use of high availability systems, backup services, data replication, and redundant datacenters.<\/p>\n<p><strong>Data Controls<\/strong><\/p>\n<p>Data is encrypted at rest and in transit, logically separated, and access is granted to authorized users only. File monitoring systems log and monitor access to data while data loss prevention systems monitor the movement of data inside and outside of <b>EI.<\/b><\/p>\n<p><strong>Data Privacy<\/strong><\/p>\n<p><b>EI<\/b> is committed to the protection and privacy of data. The protection and management of data entrusted to us is one of our highest priorities. <b>EI<\/b> follows a least privilege access model and regularly audits individuals\u2019 access to data. <b>EI<\/b> respects individuals right to privacy and we are consistently working to remain compliant with privacy regulations. Our&nbsp;<a href=\"https:\/\/www.erbessd-instruments.com\/privacy-policy\/\">Privacy Policy<\/a>&nbsp;can be viewed here.<\/p>\n<p><strong>Endpoint Security<\/strong><\/p>\n<p>Workstations and mobile devices are encrypted with whole disk encryption and require password, pin, or biometrics to access. Workstation inventories, software deployment, and security policies are controlled through enterprise configuration management. Workstations, mobile device and servers require registration with <b>EI&#8217;s&nbsp;<\/b>device management system. Workstations and servers are protected with advanced endpoint protection, which uses AI to assist in combating threats. IT equipment in <b>EI <\/b>offices are physically secured.<\/p>\n<p><strong>Incident Response<\/strong><\/p>\n<p><b>EI&#8217;s<\/b> security incident response plan dictates that security events be evaluated and escalated when appropriate. A security information and event management (SIEM) system maintains and analyzes security logs. This system is monitored 24&#215;7. Logs are regularly analyzed for suspicious activity and unusual behavior by dedicated security personnel. Memberships with legal, cyber and peer organizations are in place to facilitate timely intelligence sharing and response activities. <b>EI<\/b> maintains a close working relationship with its vendors, law enforcement and managed security services providers for additional threat intelligence, analysis and response.<\/p>\n<p><strong>Perimeter Security<\/strong><\/p>\n<p><b>EI&nbsp;<\/b>protects data, servers, and endpoints on <b>EI <\/b>and public networks using best-of-breed security controls. These controls include next generation firewalls, next generation anti-virus\/anti-malware, web security, email security and intrusion detection systems. This allows <b>EI <\/b>to prevent malicious network attacks, access to suspicious or malicious sites, prevent malicious emails or attachments and mitigate zero-day attacks.<\/p>\n<p><strong>Vendor Management<\/strong><\/p>\n<p><b>ERBESSD INSTRUMENTS&nbsp;<\/b>assesses potential vendors against a series of criteria to ensure appropriate security standards before granting a vendor system access or placing systems into operation. Contracts and data processing agreements are reviewed by the Information Security, Privacy and Legal teams before execution. The security posture of key vendors is reviewed on a regular basis.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ERBESSD INSTRUMENTS (EI) systems and data are protected by a comprehensive Information Security program detailed in the ERBESSD INSTRUMENTS Security Management System (EISMS). Dedicated security, privacy, information governance, and compliance professionals maintain the program with oversight provided by the Board of Directors in conjunction with senior leadership. ERBESSD INSTRUMENTS Security team conducts risk assessments, performs &#8230; <a title=\"DATA SECURITY AND IT SECURITY STATEMENT\" class=\"read-more\" href=\"https:\/\/www.erbessd-instruments.com\/de\/data-security-and-it-security-statement\/\" aria-label=\"Mehr Informationen \u00fcber DATA SECURITY AND IT SECURITY STATEMENT\">Weiterlesen<\/a><\/p>\n","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-10110007","page","type-page","status-publish"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DATA SECURITY AND IT SECURITY STATEMENT &#8211; ERBESSD INSTRUMENTS<\/title>\n<meta name=\"description\" content=\"ERBESSD INSTRUMENTS (EI) systems and data are protected by a comprehensive Information Security program detailed in the ERBESSD INSTRUMENTS Security &#8211; ERBESSD INSTRUMENTS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.erbessd-instruments.com\/data-security-and-it-security-statement\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DATA SECURITY AND IT SECURITY STATEMENT\" \/>\n<meta property=\"og:description\" content=\"ERBESSD INSTRUMENTS (EI) systems and data are protected by a comprehensive Information Security program detailed in the ERBESSD INSTRUMENTS Security &#8211; ERBESSD INSTRUMENTS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.erbessd-instruments.com\/data-security-and-it-security-statement\/\" \/>\n<meta property=\"og:site_name\" content=\"ERBESSD INSTRUMENTS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/erbessdinstrumentsco\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-29T21:41:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ErbessdRel\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DATA SECURITY AND IT SECURITY STATEMENT &#8211; ERBESSD INSTRUMENTS","description":"ERBESSD INSTRUMENTS (EI) systems and data are protected by a comprehensive Information Security program detailed in the ERBESSD INSTRUMENTS Security &#8211; ERBESSD INSTRUMENTS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.erbessd-instruments.com\/data-security-and-it-security-statement\/","og_locale":"de_DE","og_type":"article","og_title":"DATA SECURITY AND IT SECURITY STATEMENT","og_description":"ERBESSD INSTRUMENTS (EI) systems and data are protected by a comprehensive Information Security program detailed in the ERBESSD INSTRUMENTS Security &#8211; ERBESSD INSTRUMENTS","og_url":"https:\/\/www.erbessd-instruments.com\/data-security-and-it-security-statement\/","og_site_name":"ERBESSD INSTRUMENTS","article_publisher":"https:\/\/www.facebook.com\/erbessdinstrumentsco","article_modified_time":"2025-04-29T21:41:30+00:00","twitter_card":"summary_large_image","twitter_site":"@ErbessdRel","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.erbessd-instruments.com\/data-security-and-it-security-statement\/","url":"https:\/\/www.erbessd-instruments.com\/data-security-and-it-security-statement\/","name":"DATA SECURITY AND IT SECURITY STATEMENT &#8211; ERBESSD INSTRUMENTS","isPartOf":{"@id":"https:\/\/www.erbessd-instruments.com\/#website"},"datePublished":"2022-02-15T13:20:24+00:00","dateModified":"2025-04-29T21:41:30+00:00","description":"ERBESSD INSTRUMENTS (EI) systems and data are protected by a comprehensive Information Security program detailed in the ERBESSD INSTRUMENTS Security &#8211; ERBESSD INSTRUMENTS","breadcrumb":{"@id":"https:\/\/www.erbessd-instruments.com\/data-security-and-it-security-statement\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.erbessd-instruments.com\/data-security-and-it-security-statement\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.erbessd-instruments.com\/data-security-and-it-security-statement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.erbessd-instruments.com\/"},{"@type":"ListItem","position":2,"name":"DATA SECURITY AND IT SECURITY STATEMENT"}]},{"@type":"WebSite","@id":"https:\/\/www.erbessd-instruments.com\/#website","url":"https:\/\/www.erbessd-instruments.com\/","name":"ERBESSD INSTRUMENTS","description":"Vibration Analyzer, Online Monitoring, Video Deflection, &amp; Balancing Machine Manufacturer","publisher":{"@id":"https:\/\/www.erbessd-instruments.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.erbessd-instruments.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.erbessd-instruments.com\/#organization","name":"ERBESSD INSTRUMENTS","url":"https:\/\/www.erbessd-instruments.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.erbessd-instruments.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/erbessd_instruments_logo.png","contentUrl":"https:\/\/www.erbessd-instruments.com\/wp-content\/uploads\/2021\/06\/erbessd_instruments_logo.png","width":1073,"height":138,"caption":"ERBESSD INSTRUMENTS"},"image":{"@id":"https:\/\/www.erbessd-instruments.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/erbessdinstrumentsco","https:\/\/x.com\/ErbessdRel","https:\/\/www.linkedin.com\/company\/erbessdinstrumentsco","https:\/\/www.pinterest.com\/4d2ab37d590061eda78ee907c11410\/","https:\/\/www.youtube.com\/channel\/UCMi2XxcHeufIw5WVkcPg98A"]}]}},"_links":{"self":[{"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/pages\/10110007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/comments?post=10110007"}],"version-history":[{"count":5,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/pages\/10110007\/revisions"}],"predecessor-version":[{"id":10124404,"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/pages\/10110007\/revisions\/10124404"}],"wp:attachment":[{"href":"https:\/\/www.erbessd-instruments.com\/de\/wp-json\/wp\/v2\/media?parent=10110007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}