AutoLit® User Guide
Examining Results in Synthesis
Administrative Tools
Support and FAQs
How to Perform Systematic Review
How to Perform a Meta-Analysis
Best Practices for Writing Your Manuscript
Additional Tips for Making a Nest
AutoLit® User Guide
Examining Results in Synthesis
Administrative Tools
Support and FAQs
How to Perform Systematic Review
How to Perform a Meta-Analysis
Best Practices for Writing Your Manuscript
Additional Tips for Making a Nest
Nested Knowledge has a responsibility to educate our personnel on security practices and to comply with federal regulations related to Information Security awareness. This policy describes our plan to educate users on the importance of security.
This policy affects all employees, contractors, and consultants of Nested Knowledge.
Nested Knowledge distributes security policies to all employees and contractors as part of their training. Training includes a quiz on the content of each policy. Training is conducted annually, for all policies relevant to an employees job duties.
When policies are updated, we ensure that all employees have ready access to the most recent version. All employees with roles in incident response, data protection, or data recovery must sign off on the corresponding policy. We require all remote employees to review the remote access policy.
Developers are expected to be familiar with common vulnerabilities in web applications, how to detect them, and how to mitigate them. To standardize this expectation, OWASP modules & guidelines are trained. Specifically:
Employee training requirements are based on the data classification system. All employees and contractors will be provided with our data protection policy. Those who deal with confidential data, restricted use data, or high-risk personal data will be required to demonstrate understanding of our data protection procedures.
Employees who fail to review and comply with our information security policies, including the access control and incident management policy, will be issued a warning and required to demonstrate comprehension of security rules and procedures. Continued failure may result in disciplinary action.
Author | Date of Revision/Review | Comments |
---|---|---|
K. Cowie | 12/15/2021 | |
K. Holub | 1/25/2023 | Updated Dev Security Training Practices |