top of page
Pink Sugar

CYBERSECURITY POLICY

Policy briefs & purpose

NEXATECH’s cyber security policy outlines our guidelines and provisions for preserving the security of our data and technology infrastructure.

The more we rely on technology to collect, store, and manage information, the more vulnerable we become to severe security breaches. Human errors, hacker attacks and system malfunctions could cause great financial damage and may jeopardize our company’s reputation.

For this reason, we have implemented a number of security measures. We have also prepared instructions that may help mitigate security risks. We have outlined both provisions in this policy.

​

Scope

This policy applies to all NEXATECH’s employees, contractors, volunteers, and anyone who has permanent or temporary access to our systems and hardware.

Policy elements

​

Confidential Data:

Confidential data is secret and valuable. Common examples are:

  • Unpublished financial information

  • Data of customers/partners/vendors

  • Patents, formulas, or new technologies

  • Customer lists (existing and prospective)

All employees are obliged to protect this data. In this policy, we will give our employees instructions on how to avoid security breaches.

 

Protect Personal and Company Devices:

When employees use their digital devices to access company emails or accounts, they introduce security risk to our data. We advise our employees to keep both their personal and company-issued computer, tablet, and cell phone secure. They can do this if they:

  • Keep all devices password protected.

  • Choose and upgrade complete antivirus software.

  • Ensure they do not leave their devices exposed or unattended.

  • Install security updates of browsers and systems monthly or as soon as updates are available.

  • Log into company accounts and systems through secure and private networks only.

We also advise our employees to avoid accessing internal systems and accounts from other people’s devices or lending their own devices to others.

When new hires receive company-issued equipment they will receive instructions for:

  • [Disk encryption setup]

  • [Password management tool setup]

  • [Installation of antivirus/ anti-malware software]

They should follow instructions to protect their devices and refer to our [Security Specialists/ Network Engineers] if they have any questions.

​

Keep Emails Safe:

Emails often host scams and malicious software (e.g., worms.) To avoid virus infection or data theft, we instruct employees to:

  • Avoid opening attachments and clicking on links when the content is not adequately explained (e.g., “watch this video, it’s amazing.”)

  • Be suspicious of clickbait titles (e.g., offering prizes, advice.)

  • Check email and names of people they received a message from to ensure they are legitimate.

  • Look for inconsistencies or giveaways (e.g., grammar mistakes, capital letters, excessive number of exclamation marks.)

If an employee isn’t sure that an email they received is safe, they can refer to our [IT Specialist.]

 

Manage Passwords Properly:

Password leaks are dangerous since they can compromise our entire infrastructure. Not only should passwords be secure so they won’t be easily hacked, but they should also remain secret. For this reason, we advise our employees to:

  • Choose passwords with at least eight characters (including capital and lower-case letters, numbers, and symbols) and avoid information that can be easily guessed (e.g., birthdays.)

  • Remember passwords instead of writing them down. If employees need to write their passwords, they are obliged to keep the paper or digital document confidential and destroy it when their work is done.

  • Exchange credentials only when absolutely necessary. When exchanging them in-person isn’t possible, employees should prefer the phone instead of email, and only if they personally recognize the person they are talking to.

  • Change their passwords every two months.

Remembering a large number of passwords can be daunting. We will purchase the services of a password management tool which generates and stores passwords. Employees are obliged to create a secure password for the tool itself, following the abovementioned advice.

​

Transfer data securely:

Transferring data introduces security risk. Employees must:

  • Avoid transferring sensitive data (e.g., customer information, employee records) to other devices or accounts unless absolutely necessary. When mass transfer of such data is needed, we request employees to ask our [Security Specialists] for help.

  • Share confidential data over the company network/ system and not over public Wi-Fi or private connection.

  • Ensure that the recipients of the data are properly authorized people or organizations and have adequate security policies.

  • Report scams, privacy breaches and hacking attempts

Our [IT Specialists/ Network Engineers] need to know about scams, breaches, and malware so they can better protect our infrastructure. For this reason, we advise our employees to report perceived attacks, suspicious emails, or phishing attempts as soon as possible to our specialists. Our [IT Specialists/ Network Engineers] must investigate promptly, resolve the issue, and send a companywide alert when necessary.

Our Security Specialists are responsible for advising employees on how to detect scam emails. We encourage our employees to reach out to them with any questions or concerns.

 

Additional measures:

To reduce the likelihood of security breaches, we also instruct our employees to:

  • Turn off their screens and lock their devices when leaving their desks.

  • Report stolen or damaged equipment as soon as possible to [HR/ IT Department].

  • Change all account passwords at once when a device is stolen.

  • Report a perceived threat or possible security weakness in company systems.

  • Refrain from downloading suspicious, unauthorized, or illegal software on their company equipment.

  • Avoid accessing suspicious websites.

We also expect our employees to comply with our social media and internet usage policy.

Our [Security Specialists/ Network Administrators] should:

  • Install firewalls, anti-malware software and access authentication systems.

  • Arrange security training for all employees.

  • Inform employees regularly about new scam emails or viruses and ways to combat them.

  • Investigate security breaches thoroughly.

  • Follow this policies provisions as other employees do.

Our company will have all physical and digital shields to protect information.

 

Remote employees:

Remote employees must follow this policy’s instructions too. Since they will be accessing our company’s accounts and systems from a distance, they are obliged to follow all data encryption, protection standards and settings, and ensure their private network is secure.

We encourage them to seek advice from our [Security Specialists/ IT Administrators.]

 

Disciplinary Action:

We expect all our employees to always follow this policy and those who cause security breaches may face disciplinary action:

  • First-time, unintentional, small-scale security breach: We may issue a verbal warning and train the employee in security.

  • Intentional, repeated, or large-scale breaches (which cause severe financial or other damage): We will invoke more severe disciplinary action up to and including termination.
    We will examine each incident on a case-by-case basis.

Additionally, employees who are observed to disregard our security instructions will face progressive discipline, even if their behavior hasn’t resulted in a security breach.

 

Take security seriously:

Everyone, from our customers and partners to our employees and contractors, should feel that their data is safe. The only way to gain their trust is to proactively protect our systems and databases. We can all contribute to this by being vigilant and keeping cyber security top of mind.

CYBERSECURITY POLICY

Terms and Conditions

TERMS & CONDITIONS
Anchor 1
NEXATECH LLC'S TERMS OF USE
  • These terms and conditions of use ("Terms") apply to your use of the www.NexaTechLLC.com website (the "Site"), provided by NEXATECH LLC and her affiliates ("NEXATECH"). NEXATECH does not take any responsibility for the accuracy of the information present on this Site. NEXATECH reserves the right to change any and/or all information (including Terms). If NEXATECH does make any such changes, the revised documents will be posted on this Site and the publication date will be updated. However, NEXATECH will not provide any other type of notice to you directly. We sincerely encourage you to periodically check all documents relevant to your situation in order to stay informed about their status. For more information about our online privacy and cookie practices please read our Privacy Policy.


DISCLAIMER OF WARRANTY
  • All materials contained herein are provided "AS IS" without warranty. NEXATECH disclaims warranties of any kind, including all conditions of merchantability, whether expressly implied or statutory, fitness for a particular purpose, title, and non-infringement as well as warranties concerning availability, accuracy or content of data or other information. NEXATECH does not warrant that the Site or the functions, features, or content contained therein will be timely, secure, uninterrupted or error free, or that defects will be corrected. NEXATECH shall not be responsible for any malfunctions, errors, crashes, or other adverse events that may occur in connection with your use of the Site. Any use of the materials of/on this Site is at your own discretion and risk and you are solely responsible for any damage to your computer system, including but not limited to loss of data. If you are dissatisfied with the Site or any content or function thereon, you should simply discontinue accessing the Site.

 

LIMITATION OF LIABILITY
  • Under no circumstances shall NEXATECH be liable for any kind of damages indirect or consequential, including loss of profits or revenues and/or costs of replacement goods or damages resulting from the use of the information or materials present, even if NEXATECH was informed in advance of the possibility of such damages.

​

USER CONDUCT
  • While using the Site, you shall not:

  • ï‚·"Upload, post or transmit to, or otherwise publish through, the Site any material that violates any provision of these Terms; “Restrict or inhibit any other user from using and enjoying the Site; "Conduct yourself or encourage others to conduct themselves in a manner that would constitute a criminal offense or give rise to civil liability; "Impersonate or misrepresent your affiliation with any other person or entity; "Upload, post, publish, transmit, reproduce, distribute or in any way exploit any information or other material obtained through the Site for commercial purposes (other than as expressly permitted by the provider of such information or other material); "Engage in spamming or flooding; or "Attempt to gain unauthorized access to other computer systems through the Site.”

  • NEXATECH retains the right, but does not assume any obligation, to monitor the Site and to disclose any information as NEXATECH deems necessary or appropriate to satisfy any law, regulation, or other governmental request, to comply with any subpoena or other legal process, to operate the Site properly, to protect ourselves or our users or for other reasons as NEXATECH determines in our sole discretion. NEXATECH reserves the right to remove or refuse to post any information or materials, in whole or in part, that we determine, are unacceptable, undesirable, inappropriate or in violation of these Terms. NEXATECH may also suspend or terminate your use of the Site at any time.

​

SOFTWARE DOWNLOADS
  • Any software, online course or eBook that is made available to download from this Site is the copyrighted work of NEXATECH and/or its suppliers. Such software shall be used in accordance with the respective terms of the End User License Agreement (EULA) that accompanies the software, online course, and eBook. Any use of the Software not in accordance with the respective EULA is expressly prohibited.

​

USE OF CONTENT
  • All the information, communications, software, scripting, photos, text, video, graphics, music, sounds, images, and other materials found on this Site (collectively referred to as "Content") may be used for informational and non-commercial or personal use only, provided you do not modify the materials and that you retain all copyright and other proprietary notices contained in the materials. You may not use the content of the Site for commercial purposes without the prior expressed written consent of NEXATECH. The unauthorized copying, displaying, or other use of any Content from this Site is a violation of the domestic and/or international legislation and may be pursued to the full extent of federal and state law. Permission to link to NEXATECH from any site is not required, but prior notification to NEXATECH would be appreciated.

​

COPYRIGHT AND TRADEMARKS
  • All product and brand names are trademarks or registered trademarks of their respective holders. The trademark of NEXATECH is provided for your information and by making it available NEXATECH does not grant you a license to use it. The copyright in all material provided on this Site is held by NEXATECH or by the original creator of the material. Neither title nor intellectual property rights are transferred to you but remain the full and complete rights and title of NEXATECH or the original creator.

​

LINKS TO THIRD-PARTY SITES
  • This Site may provide links to other third-party sites. NEXATECH makes no representations whatsoever about any other site which you may access through this Site. You acknowledge and agree that NEXATECH is not responsible for the content of any linked site, or any link contained in a linked site. References on this Site to any names, marks, products, or services of any third parties or hypertext links to third party sites or information are provided solely for your convenience and do not constitute an endorsement by or association with NEXATECH of such sites or the content, products, advertising, or other materials presented on such sites. You acknowledge and agree that NEXATECH is not responsible or liable, directly, or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services available on such linked sites.

 

APPLICABLE LAWS
  • This site is operated by NEXATECH from within the United States of America. NEXATECH makes no representation that the materials of the Site are available for use in other locations, and access to them from territories where their contents are illegal is prohibited. Those who choose to access this site from other locations do so at their own risk and are responsible for compliance with any applicable local laws. User may not use or transfer the materials of the Site in violation of US export or other law and regulations. Any claim relating to the Terms shall be governed by the Laws of the State of Texas.

​

QUESTIONS
  • Please Contact Us at info@NexaTechllc.com if you have any questions about NEXATECH’s privacy policy or other legal guidelines.

bottom of page