Product
POPULAR CHECKS
MOM education verification
Reference
Civil background
Employment history
Social media
Criminal record
Right to work
Adverse financial history
Identity
Instant employment
All background checks
How we compare?
KEY FEATURES
Continuous screening
Compliance
Verepass
Global services
API
Whistleblowing
POPULAR INTEGRATIONS
All integrations
Industries
KEY INDUSTRIES
Finance & Fintech
Energy
Professional Services
Tech & IT
Staffing & Outsourcing
Country-specific packages
UK
Singapore
Philippines
New Zealand
Australia
USA
Business-sized solutions
Growth
Enterprise
Resources
Blog
Knowledge and insights from the world of hiring and HR
Webinar
Discover our upcoming and on-demand webinars
Reports
Data-driven, investigative long reads from industry experts
Case studies
Discover the ways we help customers all over the world
HR glossary
Get to grips with all the HR terms, jargon and lingo you need to know
ROI calculator
Calculate the return on investment of background checks
Help centre
Knowledge and insights from the world of hiring and HR
Contact support
Chat, phone and email support available globally

Why the increase in fraud highlights the need for deeper background checks

Get your own copy!
PartnersPricing
LoginSpeak to an expert
LoginSpeak to an expert

General information security policy

‍Protect Veremark’s informational and IT assets (including but not limited to all computers, mobile devices, networking equipment, software, and sensitive data) against all internal, external, deliberate, or accidental threats and to mitigate the risks associated with the theft, loss, misuse, damage or abuse of these systems;

Ensure information will be protected against any unauthorized access. Users shall only have access to resources that they have been specifically authorized to access. The allocation of privileges shall be strictly controlled and reviewed regularly.

Protect CONFIDENTIALITY of information. When we talk about the confidentiality of information, we are talking about protecting the information from disclosure to unauthorized parties;

Ensure INTEGRITY of information. Integrity of information refers to protecting information from being modified by unauthorized parties;

Maintain AVAILABILITY of information for business processes. Availability of information refers to ensuring that authorized parties can access the information when needed.

Comply with and, wherever possible, exceed, national legislative and regulatory requirements, standards, and best practices;

Develop, Maintain and Test business continuity plans to ensure we stay on course despite all obstacles that we may come across. It is about “keeping calm and carrying on!”;

Raise awareness of information security by making information security training available for all Employees. Security awareness and targeted training shall be conducted consistently, security responsibilities reflected in job descriptions, and compliance with security requirements shall be expected and accepted as a part of our culture;

Ensure that no action will be taken against any employee who discloses an information security concern through reporting or in direct contact with Information Security Management Leader, unless such disclosure indicates, beyond any reasonable doubt, an illegal act, gross negligence, or a repetitive deliberate or willful disregard for regulations or procedures;

Report all actual or suspected information security breaches to security@veremark.com or by using the form linked in POL-17 Incident Management, Appendix B

‍

Older Versions

Version 1.0
→
follow us on:
Company
AboutPartnersCareersContact
Resources
BlogReports & whitepapersCase studiesWebinarsVideosGlobal servicesSubscribe
Service
Candidate supportVerify PassportHelp centerFAQs
Legal
Customer data protection policyGeneral information security policyTerms of serviceCode of conduct and ethics policyWebsite Privacy policyWebsite Cookie policy
ISO27001 certified
Copyright © 2024 Veremark. All rights reserved