Policies & Procedures

Security Policies

Access and download our comprehensive security policies that guide our operations and ensure the highest standards of information security and compliance.

Last Updated: December 2025

Our Security Policies

Preview our comprehensive security policies that outline our commitment to maintaining the highest standards of information security and data protection.

The documents below show Table of Contents only. Complete policy documents are available upon request.

Acceptable Use & Access Management

Defines the acceptable use of MYND's information technology resources and access management procedures.

Preview

Business Continuity Plan

Outlines our approach to ensuring business continuity and disaster recovery in the event of a disruption.

Preview

Change Management

Establishes procedures for managing changes to IT systems and infrastructure in a controlled manner.

Preview

Data Privacy Policy

Describes how we collect, use, and protect personal data in compliance with applicable data protection regulations.

Preview

IT Asset Management

Defines the procedures for managing and securing IT assets throughout their lifecycle.

Preview

Secure Development (SDLC)

Outlines secure coding practices and security requirements throughout the Software Development Lifecycle.

Preview

Incident Management

Establishes procedures for identifying, responding to, and recovering from security incidents.

Preview

Password Policy

Defines requirements for creating and managing strong passwords to protect user accounts and systems.

Preview

Risk Assessment

Outlines the methodology for identifying, assessing, and mitigating information security risks.

Preview