Compliance
8 compliance areas
GDPR
ISO 27001
SOC 2
ECPA
CCPA
CFAA
Consumer Protection Laws
Legal, statutory, regulatory, and contractual
Regulations
Selected control groups
IT Security Controls
Safeguard information systems and data integrity.
Enforce strict access controls for critical systems, ensuring that only authorized personnel have access.
Compliance Controls
Ensure adherence to relevant laws, regulations, and industry standards.
Provide regular training sessions to keep employees informed about compliance requirements.
Data Privacy Controls
Protect customer and employee data from unauthorized access and ensure compliance with privacy regulations.
Conduct assessments to identify and rectify potential vulnerabilities in data handling processes.
Internal Audit Controls
Assess and monitor the overall effectiveness of internal controls.
Conduct periodic internal audits to review the implementation and effectiveness of controls.
Regularly review and update the Internal Control Matrix based on audit findings and changes in the business environment.
Intermediaries
Subprocessor preview

Amazon Web Services
GitHub

Heroku
MongoDB
FAQs
Security review basics
01
What kind of compliances does BW Events have?
BW Events is committed to maintaining compliance with industry standards and regulations. We are in the process of obtaining certifications for ISO 27001 and SOC 2 with the partnership and support of Align.
02
How does BW Events ensure the security of our data?
BW Events uses industry-standard encryption protocols to protect data collected through our platform. Data is encrypted during transmission and at rest.
03
What measures prevent unauthorized access to our data?
We implement role-based permissions, multi-factor authentication, and strict access controls to limit data access to authorized personnel.
04
Is our data stored securely on BW Events' servers?
Yes. Data is stored on secure servers hosted by trusted third-party providers, and stored data is encrypted to protect it while at rest.
Financial Controls
Control
Status
Ensure the accuracy and reliability of financial reporting
IT Security Controls
Control
Status
Safeguard information systems and data integrity.
Enforce strict access controls for critical systems, ensuring that only authorized personnel have access.
Inventory Management Controls
Control
Status
Ensure accurate tracking and valuation of inventory.
Implement an inventory management system to track real-time stock levels and facilitate accurate reporting.
Conduct regular physical counts of inventory to compare against recorded levels.
Vendor Management Controls
Control
Status
Ensure compliance with procurement policies and mitigate vendor-related risks.
Human Resources Controls
Control
Status
Ensure compliance with HR policies and protect sensitive employee information.
Compliance Controls
Control
Status
Ensure adherence to relevant laws, regulations, and industry standards.
Provide regular training sessions to keep employees informed about compliance requirements.
Data Privacy Controls
Control
Status
Protect customer and employee data from unauthorized access and ensure compliance with privacy regulations.
Conduct assessments to identify and rectify potential vulnerabilities in data handling processes.
Internal Audit Controls
Control
Status
Assess and monitor the overall effectiveness of internal controls.
Conduct periodic internal audits to review the implementation and effectiveness of controls.
Regularly review and update the Internal Control Matrix based on audit findings and changes in the business environment
Subprocessors

Amazon Web Services • Cloud hosting
Github

Heroku
MangoDB
Google Workspace
Trello
Salesforce
Slack
FAQs
Security questions clients ask most often
1. What kind of compliances does BW Events have?
BW Events is committed to maintaining compliance with industry standards and regulations. Currently, we are in the process of obtaining certifications for ISO 27001 and SOC 2 with the partnership and support of Align, a leading compliance solutions provider. These certifications demonstrate our dedication to upholding the highest standards of data security and compliance.
2. How does BW Events ensure the security of our data?
BW Events takes data security seriously and employs industry-standard encryption protocols to protect all data collected through our platform. Data is encrypted both during transmission and at rest, ensuring comprehensive security measures.
3. What measures does BW Events take to prevent unauthorized access to our data?
We implement stringent access controls, including role-based permissions and multi-factor authentication, to limit access to your data only to authorized personnel. Additionally, we encrypt data at rest to prevent unauthorized access to stored information.
4. Is our data stored securely on BW Events' servers?
Yes, your data is stored on highly secure servers hosted by trusted third-party providers. These servers adhere to the highest standards of security protocols to prevent data breaches or unauthorized access. Furthermore, all stored data is encrypted to ensure its security while at rest.
5. Does BW Events share our data with third parties?
BW Events does not share your data with any third parties unless explicitly authorized by you or required by law. We prioritize the confidentiality and privacy of your information and adhere to strict data protection policies, including encryption of data during transmission to third-party services.
6. What steps does BW Events take to prevent data loss or corruption?
We regularly backup data to multiple secure locations to mitigate the risk of data loss. Additionally, our systems are equipped with failover mechanisms to ensure continuous operation and minimize the impact of any potential disruptions. All backed-up data is encrypted to maintain its integrity and security.
7. How does BW Events handle data in compliance with global data protection regulations?
BW Events is committed to compliance with applicable data protection laws, including but not limited to GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act). We provide tools and features to help our customers fulfill their obligations under these regulations, including encryption of data both in transit and at rest.
8. What should we do if we suspect a security incident or breach involving our data?
In the event of a suspected security incident or breach, please contact BW Events immediately through our dedicated support channels. We have procedures in place to investigate and respond promptly to any security concerns raised by our customers. All communication channels are secured with encryption to safeguard the information shared during such incidents.
9. Can we request access to our data or request its deletion from BW Events' systems?
Yes, you can request access to your data or submit a request for its deletion by contacting our support team. We will promptly assist you in fulfilling your data rights in accordance with applicable data protection laws. Any data provided to you or deleted from our systems is handled securely, with encryption protocols in place to protect its confidentiality.
10. How frequently does BW Events conduct security audits and assessments?
We conduct regular security audits and assessments of our systems, infrastructure, and procedures to identify and address any potential vulnerabilities or weaknesses. These audits are performed by internal teams as well as third-party security experts to ensure comprehensive coverage. All audit processes and reports are handled with encryption to maintain the security of the information involved.


