Access Management: GETA AI Private Limited maintains a formal access management process for the request, review, approval and provisioning of all personnel with access to Customer Personal Data to limit access to Customer Personal Data and systems storing, accessing or transmitting Customer Personal Data to properly authorized persons having a need for such access. Access reviews are conducted periodically to ensure that only those personnel with access to Customer Personal Data still require it.
Infrastructure Security Personnel: GETA AI Private Limited has, and maintains, a security policy for its personnel, and requires security training as part of the training package for its personnel. GETA AI Private Limited's infrastructure security personnel are responsible for the ongoing monitoring of GETA AI Private Limited's security infrastructure, the review of the Services, and for responding to security incidents.
Access Control and Privilege Management: GETA AI Private Limited's and Customer's administrators and end users must authenticate themselves via a Multi-Factor authentication system or via a single sign-on system using OAuth 2.0 in order to use the Services.
Internal Data Access Processes and Policies: GETA AI Private Limited's internal data access processes and policies are designed to protect against unauthorized access, use, disclosure, alteration or destruction of Customer Personal Data. GETA AI Private Limited designs its systems to only allow authorized persons to access data they are authorized to access based on principles of "least privileged" and "need to know", and to prevent others who should not have access from obtaining access.
GETA AI Private Limited requires the use of unique user IDs, strong passwords, two factor authentication and carefully monitored access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel's job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with GETA AI Private Limited's internal data access policies and training.
Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability. Where passwords are employed for authentication (e.g., log-into workstations), password policies follow industry standard practices. These standards include password complexity, password expiry, password lockout, restrictions on password reuse and re-prompt for password after a period of inactivity.