Our Partners close more business.

Use these powerful resources to win more business, faster, with less effort.  
Call 877-411-2220 x121 for personal support with any opportunity.

RESET SEARCH

Hosting Quote Estimator

GET a FREE Sandbox or Trial Environment NOW

How To Use This Tool:  

To find answers to common RFP and RFI questions, select a tag, or, search for terms like "security", "performance", etc.  You will find common questions and answers grouped together in one record.  Follow the tag links to refine your search.  Supporting downloads and documentation are available, below.

Please login to obtain download access to additional supporting documentation.  Registered users can also contribute to the database.  You can request access by Contacting Us.

© Omegabit LLC, 2023

Enter a Search Phrase or Select a Tag

Content with tag risk assesment .

Risk Management - Assessment

Q:

Do you have a risk assessment program, policy and procedures that have been documented, approved by management and communicated to appropriate constituents?

Are risk assessments performed to identify, estimate, and prioritize risk to organizational operations and assets, individuals, and other organizations?

Does the risk assessments take into account threats, vulnerabilities, likelihood and impact, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and information it processes, stores, or transmits?

Does your organization regularly conduct security assessments of the system?


A:

Due to the nature of our business and services, Risk Management is an inherent part of our DR planning lifecycle and includes business factors including finance, infrastructure, personnel, liabilities, etc. A quarterly assessment of these risks is performed as part of our regular strategic planning lifecycle. This information is proprietary.

Please see the SOC 2 Type II compliance facilities report and "Federal Reserve Bank of New York - Omegabit Operations Policy Guidelines and Recommendations" document supplied with this response. We frequently participate in customer-specific audits performed by Clients using their preferred standard or methodology, typically, PCI/PII, FERPA, FEDRAMP, HIPAA, or similar compliance. These are completed by internal Client security teams or third parties, at the Client's discretion. These compliance certifications must typically be established proprietary the customer's specific software and infrastructure implementation and are private.

This is inherent to our regular mode of operations and procedures and is refreshed in an ongoing basis to keep pace with evolving threats and best practices. Formal reviews occur quarterly. However, these matters are addressed on an almost daily basis due to the nature of operations. Please see the responses to tab 1 for more information.

Yes



No comments yet. Be the first.