GoMarble Information Security Program
Last Updated: Jan 21, 2026
Purpose
This Information Security Policy defines the controls and practices GoMarble uses to protect information assets and customer data. It supports the Information Security Program and establishes clear security expectations.
Scope
This policy applies to all GoMarble employees, contractors, systems, applications, and infrastructure that process, store, or transmit customer or company data.
3. Access Control
Access to systems and data is granted based on the principle of least privilege.
User access is limited to what is necessary to perform assigned job responsibilities.
Authentication mechanisms are enforced to prevent unauthorized access.
Access is reviewed periodically and revoked promptly when no longer required.
4. Data Protection
Customer data is used only for authorized business purposes.
Data access is restricted to authorized personnel.
Reasonable safeguards are implemented to prevent unauthorized disclosure, alteration, or loss of data.
Data retention and deletion practices follow legal, contractual, and business requirements.
5. Encryption
Data in transit is protected using industry-standard encryption protocols.Sensitive data stored in production systems is encrypted where appropriate.Encryption keys, secrets, and credentials are stored and managed securely.
6. Incident Response
GoMarble maintains a documented incident response process to identify, assess, and respond to security incidents.Security incidents are investigated promptly.Appropriate corrective actions are taken to mitigate impact and prevent recurrence.Customers and partners are notified as required by law or contract.
7. Vulnerability Management & Remediation
GoMarble maintains a vulnerability management process to identify, assess, prioritize, and remediate security vulnerabilities across systems and applications.
Vulnerabilities may be identified through internal reviews, automated scanning, third-party reports, or responsible disclosure.
Remediation SLAs:
Critical vulnerabilities: Remediated within 1 business day.
All other severities: Remediated within 3 business days.
Remediation efforts are tracked and verified to ensure resolution. Systems are patched and updated regularly to reduce exposure to known threats.
8. Vendor and Third-Party Security
Third-party service providers are selected based on security, reliability, and compliance considerations.
Vendors with access to customer data are expected to implement appropriate security controls.
Access granted to third parties is limited to the minimum required and reviewed periodically.
9. Employee Security Awareness
Employees and contractors are expected to follow security best practices
Security responsibilities are communicated during onboarding
Employees must report suspected security incidents or vulnerabilities promptly
10. Device Security
Company-managed devices used to access GoMarble systems enforce anti-malware protection
Firewalls are enabled on company-managed devices
Automatic screen lock with timeout is required on devices accessing sensitive systems
Devices must be kept up to date with security patches and updates
11. Policy Review
This Information Security Policy is reviewed periodically and updated as necessary to reflect changes in technology, business operations, regulatory requirements, or security risks.
The AI Agent for Paid Media Marketers
Copyright © GoMarble AI 2026