SECURITY
POLICY

BellKahn is an IT services, consulting, and business solutions organization that delivers consulting led Assessment and cognitive driven services.

BellKahn is an IT services, consulting, and business solutions organization that delivers consulting led Assessment and cognitive driven services. We provide integrated business, technology, and engineering solutions through our unique Certified Independent Agile™ delivery model.

1. Our Security Vision

To ensure BellKahn remains reliable, trusted, and secure in a dynamic environment marked by evolving threats, disruptions, and cyber risks.

2. Policy Commitment

This Security Policy reaffirms our dedication to safeguarding all information and assets under our ownership or responsibility. Our goal is to maintain a secure, trusted environment for BellKahn, our employees, and our customers.

3. Security Framework

  • Implement a risk-based approach to information security
  • Establish and maintain a secure information infrastructure
  • Protect data confidentiality, integrity, and availability
  • Meet applicable legal, regulatory, and contractual requirements
  • Ensure business continuity and resilience

4. Access Control

  • Grant access based on least privilege and business need
  • Enforce strong authentication and authorization mechanisms
  • Regularly review and update access permissions

5. Physical and Environmental Security

  • Restrict access to data centers and sensitive areas
  • Deploy surveillance, alarms, and physical barriers
  • Protect equipment from environmental threats

6. Data Protection

  • Classify and label data appropriately
  • Encrypt sensitive data at rest and in transit
  • Secure data disposal mechanisms

7. Incident Management

  • Maintain a structured incident response plan
  • Detect, report, and respond to security incidents promptly
  • Continuously improve processes based on incident analysis

8. Employee Awareness

  • Conduct regular training on security best practices
  • Promote a security-first culture across the organization
  • Include security responsibilities in job roles

9. Compliance and Auditing

  • Regularly audit systems and policies for compliance
  • Adopt international security standards (e.g. ISO/IEC 27001)
  • Corrective actions based on audit outcomes

10. Contact Us

For questions regarding this policy, contact:

(This Security Policy is effective as of July 2025 and may be updated periodically.)