NEWS

Introducing Rosterfy's Trust Center

Rosterfy's Trust Center connects you to our privacy, security and compliance protocols and procedures, to ensure that you and your team feel confident when it comes to managing your data.


Our mission at Rosterfy is to connect communities to events and causes through volunteering. For many organizations, it’s important to understand how software operates with regard to security, privacy and compliance. Introducing the Rosterfy Trust Center.

The Rosterfy Trust Center connects you to our privacy, security and compliance protocols and procedures, to ensure that you and your team have the information you need to feel confident when it comes to managing your data. 

Take a look at the Rosterfy Trust Center

 

Infrastructure Security 

Our enterprise-grade security is built into every facet of Rosterfy and is focused on risk management and compliance. 

From accessing networks and network services to management of secret identification identifiers, having a system that protects your organisation with the safeguards it needs ensure proper governance and security is paramount at Rosterfy. 

Within our Trust Center you will find 25 Infrastructure Security procedures. Our top 5 are listed below:

  • Capacity management
  • Information backup
  • Networks security
  • Protection against malware
  • Monitoring activities

Take a look at the full list of Infrastructure Security procedures in the Rosterfy Trust Center.

 

Organizational Security

While it’s important to have the right software in place to support your organization's data protection, it is equally important that your employees understand how their administrative processes on Rosterfy impact their data security. 

From identity and device management that ensures that only approved people have access to information stored on Rosterfy to screening your employees and disciplinary processes, all the way through to working in secure office environments, Rosterfy’s Trust Center outlines how your organisation can ensure Enterprise-level data management and security.

Within our Trust Center you will find 35 Organizational Security procedures. Our top 5 are listed below:

  • Access control
  • Information security awareness, education and training
  • Information security roles and responsibilities
  • Screening
  • Information security risk assessment

Take a look at the full list of Organizational Security procedures in the Rosterfy Trust Center.

 

Product Security

Rosterfy is a constantly evolving product (not like some of our static competitors!) and as such we are committed to ensuring world class product security.

From restricting source code to only certain developers to separating the development, testing and operational environments to reduce the risks of unauthorized access or changes to the operational environment, Rosterfy is committed to ensuring security at the highest standard. 

Within our Trust Center you will find 6 Product Security procedures. We’ve included a few of our favourites below:

  • Separation of development, testing and operational environments
  • Threat Intelligence
  • Secure development life cycle
  • Secure system architecture and engineering principles
  • Independent review of information security
  • Use of cryptography

Take a look at the full list of Product Security procedures in the Rosterfy Trust Center.

 

Internal Security Procedures

When weighing up which volunteer management solution is right for you it is important to consider how a VMS manages its internal security procedures. 

This is by far the most comprehensive section of the Rosterfy Trust Center and encompasses everything from change management, information system audits, mobile device policies, leadership and commitment and so much more. 

With 60 Internal Security Procedures listed in the Trust Center, Rosterfy has invested significant time and resources into ensuring that Rosterfy complies on every level. We have listed our top 5 processes to check out below:

  • Information security incident management planning and preparation
  • Information security management system
  • Change management
  • Management of technical vulnerabilities
  • Internal Audit Program

Take a look at the full list of Internal Security Procedures in the Rosterfy Trust Center.

 

Data and Privacy

Last but certainly not least is our Trust Center’s section on Data and Privacy. From the handling of assets to disposal of media and information transfer policies, Rosterfy’s Trust Center has a further 10 procedures documented with regards to Data and Privacy. We’ve included a few of our favourites below:

  • Privacy and protection of PII
  • Information deletion
  • Acceptable use of information and other associated assets
  • Information transfer

Take a look at the full list of Data and Privacy procedures in the Rosterfy Trust Center.

 

Frequently Asked Questions

To further aid your decision making regarding a volunteer management solution, Rosterfy’s Trust Center has an entire section dedicated to Frequently Asked Questions designed to help Volunteer Managers, Procurement, Finance and Senior Management understand specifically how Rosterfy safeguards  our customers data.

Take a look at our comprehensive FAQs in the Rosterfy Trust Center.

 

Want to learn more about how Rosterfy can help you and your organization safeguard your data and ensure compliance?

Speak to one of our friendly sales team today to learn more

 

Similar posts

Join our Newsletter Mailing List

Be the first to know about new Volunteer Management insights, news and feature updates to Rosterfy.