background grid
Back to Legal & Security Hub

IT & Security Policy

Last updated: March 4, 2025

1. Purpose and Objectives

PALANTEX is committed to protecting the confidentiality, integrity, and availability of its information systems, digital infrastructure, and data. This IT & Security Policy establishes the principles and controls designed to safeguard information assets, ensure operational resilience, and protect users against security threats.

2. Scope

This policy applies to all PALANTEX systems, platforms, applications, infrastructure, data, employees, contractors, service providers, and any third parties with access to PALANTEX information systems.

3. Information Security Principles

PALANTEX’s security framework is based on the following core principles:
  • Confidentiality: ensuring that information is accessible only to authorized individuals
  • Integrity: protecting information from unauthorized modification or destruction
  • Availability: ensuring reliable and timely access to systems and data

4. Access Control and Authentication

Access to PALANTEX systems and sensitive data is restricted to authorized personnel only, based on the principle of least privilege. Strong authentication mechanisms are enforced, including multi-factor authentication where appropriate. Access rights are reviewed regularly and promptly revoked when no longer required.

5. Data Protection and Encryption

PALANTEX implements industry-standard encryption protocols to protect data both in transit and at rest. Sensitive and personal data are handled in accordance with applicable data protection and privacy regulations. Secure key management practices are enforced.

6. Infrastructure and Network Security

Our infrastructure is continuously monitored to detect, prevent, and respond to security threats. Security measures include firewalls, intrusion detection and prevention systems, segmentation of critical systems, and regular patching and updates.

7. Application and Platform Security

PALANTEX applies secure development and deployment practices, including code reviews, testing, and change management procedures. Security vulnerabilities are assessed and remediated in a timely manner.

8. Monitoring, Logging, and Auditing

System activity is logged and monitored to identify suspicious behavior, unauthorized access, or anomalies. Logs are retained securely and reviewed as part of regular security assessments and audits.

9. Incident Response and Business Continuity

PALANTEX maintains incident response and business continuity procedures designed to respond effectively to security incidents, system failures, or cyberattacks. Incidents are investigated promptly, and corrective actions are implemented to prevent recurrence.

10. Third-Party and Vendor Risk

Third-party service providers are subject to due diligence and security assessments to ensure they meet PALANTEX’s security standards. Access by third parties is limited, monitored, and governed by contractual safeguards.

11. User Responsibilities

Users are expected to follow good security practices, including protecting credentials, enabling available security features, and reporting any suspicious activity or potential vulnerabilities without delay.

12. Policy Review and Updates

This policy is reviewed regularly and updated as necessary to address evolving security threats, technological changes, and regulatory requirements.

13. Limitations

While PALANTEX implements robust security measures, no system can be guaranteed to be completely secure. Users acknowledge and accept the inherent risks associated with digital platforms.

14. Contact

For questions or concerns regarding this IT & Security Policy, or to report a security issue, please contact:

PALANTEX – Complaints Department
complaints@palantex.com

Back to Legal & Security Hub