Zams recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Zams so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Continuously monitored
Communications & Network Security Policy
Policy
PHI Data breach Notification Procedure
Policy
Physical and Environmental Security Procedure
Policy
Data Retention Policy
Policy
SDLC Procedure
Policy
Compliance Policy
Policy
Github App
Development software
Slack for access
Collaboration
Microsoft Azure
IT infrastructure
Rippling
HRMS
Sentry
Analytics
Google Workspace
IAM providers