How can a user access and review the Information Security Policy?
Information Security Policy
We maintain multiple security policies, all accessible via our internal Ostendio platform. All policies and procedures are drafted, approved, published, and distributed via the Ostendio platform. This process is included within SOC2.