Information Security Policy
Comprehensive security governance framework for INNOptimizer™ platform
This is a draft document under review. Final version will be published upon approval.
This Information Security Policy establishes the framework for protecting information assets, systems, and data within INNOptimizer™. This policy applies to all employees, contractors, partners, and users of our Bayesian optimization platform.
Our Commitment: We are committed to maintaining the confidentiality, integrity, and availability of all information entrusted to us while enabling scientific innovation through secure optimization services.
Data Protection
- • AES-256 encryption for data at rest
- • TLS 1.3 for data in transit
- • Complete user data isolation
- • Automated retention management
Access Controls
- • Multi-factor authentication
- • Role-based access control
- • Principle of least privilege
- • Regular access reviews
Compliance
- • GDPR and CCPA compliance framework
- • SOC 2 Type II readiness program
- • ISO 27001 aligned practices
- • Ongoing compliance assessments
Incident Response
- • Continuous security monitoring
- • Business days response commitment
- • Dedicated security team
- • Comprehensive recovery procedures
Security Issues
security@synsilico.com
Vulnerabilities & incidents
Privacy & Data Rights
privacy@synsilico.com
Data protection inquiries
We aim to respond to all inquiries within 1-3 business days
Full Policy Document
Download the complete draft Information Security Policy document. This is the current draft version under review by executive management.