Information Security
Overview
Geofund is the leading platform to empower businesses with automated product traceability. Our solution empower businesses to automate transaction-level traceability to streamline certifications, and deliver audit-ready chain-of-custody for industrial inputs and sustainable materials globally.
At Geofund, we understand the importance of keeping our customer's information secure. We value security as a top priority and implemented a comprehensive security program. We understand that trust is earned and we are dedicated to earning and maintaining customer trust.
If there is something we can do to earn your trust, let us know at security@geofund.io.
Compliance


Documents
2025 Security Packet
Download
2025 Internal Audit Report
Download
Please submit your email to request for access.
Organizational Controls
CONTROL
STATUS
Policies for information security
Geofund maintains robust security and topical policies that are communicated to key personnel and reviewed at least annually. |
Information security roles and responsibilities
Geofund maintains defined security roles and responsibilities that are documented and updated based on organizational needs.
Segregation of duties |
Conflicting duties are separated among roles and personnel to mitigate conflicts of interest or bad actors.
Management responsibilities
Geofund requires all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organization.
Contact with authorities
Geofund maintains contact with relevant authorities.
Contact with special interest groups
Geofund maintains contact with special interest groups, specialist security forums, and professional associations.
Threat intelligence
Geofund collects information relating to information security to produce threat intelligence.
Information security in project management
Geofund integrates information security into project management.
Acceptable use of information and other associated assets
Geofund documents and implements rules for the acceptable use and procedures for handling information and other associated assets.
Return of assets
Personnel and other interested parties return all of Geofund's assets in their possession upon change or termination of their employment, contract or agreement.
Classification of information |
Geofund classifies information according to the information security needs of the organization based on confidentiality, integrity, availability and relevant interested party requirements. |
Labelling of information |
Geofund maintains an appropriate set of procedures for information labeling.
Information transfer
Geofund maintains information transfer rules between the organization and other parties.
Access control
Geofund maintains rules to control physical and logical access to information.
Authentication information
Geofund controls allocation and management of authentication information such as passwords, including advising personnel on the appropriate handling of authentication information.
Access rights
Geofund provisions and reviews access rights to information and other associated assets regularly in line with relevant policies.
Information security in supplier relationships
Geofund maintains and enforces a policy on supplier security.
Addressing information security within supplier agreements
Geofund establishes and enforces relevant information security requirements with each supplier based on the type of supplier relationship.
Managing information security in the ICT supply chain
Geofund maintains ICT suppy chain security standards.
Monitoring, review and change management of supplier services
Geofund monitors and responds to changes in supplier security practices.
Information security for use of cloud services
Geofund maintains a policy governing the use of cloud services and relevant security practices.
Information security incident management planning and preparation
Geofund defines and maintains information security incident management roles and responsibilities.
Assessment and decision on information security events
Geofund assesses all information security events and to determine if they are to be categorized as information security incidents.
Response to information security incidents
Geofund responds to information security incidents in accordance with governing procedures.
Learning from information security incidents
Geofund documents lessons learned from all information security incidents to strengthen and improve information security controls.
Collection of evidence
Geofund establishes and implements procedures for the identification, collection, acquisition and preservation of evidence related to information security events.
Information security during disruption
Geofund maintains and reviews contigency plans to maintain information security at appropriate levels during disruptions.
ICT readiness for business continuity
Geofund maintains ICT readiness requirements, including recovery time objectives for key vendors and processes.
Legal, statutory, regulatory and contractual requirements
Geofund documents and complies with legal, statutory, regulatory and contractual requirements relevant to information security.
Intellectual property rights
Geofund stringently protects the intellectual property rights of its customers, partners, and stakeholders.
Protection of records
Geofund maintains record management practices including storage, maintenance, destruction, and access.
Privacy and protection of PII
Geofund stringently protects personally identifiable information in all systems.
Independent review of information security
Geofund's information security policies, procedures and practices are regularly reviewed by third parties including external experts and auditors.
Compliance with policies, rules and standards for information security
Geofund regularly reviews compliance levels with the organization's information security policy, topic-specific policies, rules and standards
Documented operating procedures
Geofund documents key procedures for information security and makes them available when relevant.
Employee Termination Checklist and Asset Return Control
Geofund uses a termination checklist to ensure that an employee's system access, including physical access, is removed within a specified timeframe and all organization assets (physical or electronic) are properly returned.
Vendor Compliance Review
Geofund maintains a directory of its key vendors, including their compliance reports. Critical vendor compliance reports are reviewed annually.
Information Security Roles and Competencies
Geofund has an established list of applicable information security roles and specified skill and competence level required for each role.
Vendor Management Policy
Geofund has a defined vendor management policy that establishes requirements of ensuring third-party entities meet the organization's data preservation and protection requirements.
Business Associate Agreement Policy
Geofund has a defined policy that establishes the requirements related to Business Associate Agreements.
External Communication of Security Commitments
Geofund's security commitments are communicated to external users, as appropriate.
People Controls
People Controls
People Controls
CONTROL
CONTROL
CONTROL
STATUS
STATUS
STATUS
Screening
Screening
Screening
Screening
Geofund conducts background verification checks on all candidates for employment.
Geofund conducts background verification checks on all candidates for employment.
Terms and conditions of employment
Terms and conditions of employment
Terms and conditions of employment
Terms and conditions of employment
Geofund binds all employees to information security practices in the terms and conditions of employment.
Geofund binds all employees to information security practices in the terms and conditions of employment.
Information security awareness, education and training
Information security awareness, education and training
Information security awareness, education and training
Information security awareness, education and training
Geofund provides regular security awareness training to all staff.
Geofund provides regular security awareness training to all staff.
Disciplinary process
Disciplinary process
Disciplinary process
Disciplinary process
Geofund's information security policies, procedures and practices are regularly reviewed by third parties including external experts and auditors.
Geofund's information security policies, procedures and practices are regularly reviewed by third parties including external experts and auditors.
Responsibilities after termination or change of employment
Responsibilities after termination or change of employment
Responsibilities after termination or change of employment
Responsibilities after termination or change of employment
Geofund holds former employees responsible for information security responsibilities even after termination or departure.
Geofund holds former employees responsible for information security responsibilities even after termination or departure.
Confidentiality or non-disclosure agreements
Confidentiality or non-disclosure agreements
Confidentiality or non-disclosure agreements
Confidentiality or non-disclosure agreements
Geofund requires confidentiality and non-disclosure agreements from employees with access to sensitive information.
Geofund requires confidentiality and non-disclosure agreements from employees with access to sensitive information.
Remote working
Remote working
Remote working
Remote working
Geofund implements security measures designed to mitigate remote work risks, such as clear screen and VPN requirements.
Geofund implements security measures designed to mitigate remote work risks, such as clear screen and VPN requirements.
Information security event reporting
Information security event reporting
Information security event reporting
Information security event reporting
Geofund maintains procedures for security event reporting.
Geofund maintains procedures for security event reporting.
Physical Controls
Physical Controls
Physical Controls
CONTROL
CONTROL
CONTROL
STATUS
STATUS
STATUS
Clear desk and clear screen
Clear desk and clear screen
Clear desk and clear screen
Clear desk and clear screen
Geofund maintains clear screen and clear desk rules.
Geofund maintains clear screen and clear desk rules.
Security of assets off-premises
Security of assets off-premises
Security of assets off-premises
Security of assets off-premises
Geofund maintains strict rules around use of devices off premises, including BYOD policies.
Geofund maintains strict rules around use of devices off premises, including BYOD policies.
Technological Controls
Technological Controls
Technological Controls
CONTROL
CONTROL
CONTROL
STATUS
STATUS
STATUS
User endpoint devices
User endpoint devices
User endpoint devices
User endpoint devices
Geofund maintains policies requiring secure handling of user endpoint devices.
Geofund maintains policies requiring secure handling of user endpoint devices.
Privileged access rights
Privileged access rights
Privileged access rights
Privileged access rights
Geofund strictly maintains privileged access permissions among employees.
Geofund strictly maintains privileged access permissions among employees.
Information access restriction
Information access restriction
Information access restriction
Information access restriction
Geofund restricts access to sensitive information on a need-to-know basis.
Geofund restricts access to sensitive information on a need-to-know basis.
Access to source code
Access to source code
Access to source code
Access to source code
Geofund stringently manages read, pull, and write access to all code bases.
Geofund stringently manages read, pull, and write access to all code bases.
Secure authentication
Secure authentication
Secure authentication
Secure authentication
Geofund requires secure authentication procedures on all company systems.
Geofund requires secure authentication procedures on all company systems.
Capacity management
Capacity management
Capacity management
Capacity management
Geofund actively monitors the capacities of information processing systems, such as cloud resources.
Geofund actively monitors the capacities of information processing systems, such as cloud resources.
Protection against malware
Protection against malware
Protection against malware
Protection against malware
Geofund maintains malware prevention practices.
Geofund maintains malware prevention practices.
Management of technical vulnerabilities
Management of technical vulnerabilities
Management of technical vulnerabilities
Management of technical vulnerabilities
Geofund actively monitors and remediates vulnerabilities for all systems in use.
Geofund actively monitors and remediates vulnerabilities for all systems in use.
Configuration management
Configuration management
Configuration management
Configuration management
Geofund enforces secure configuration rules for all devices.
Geofund enforces secure configuration rules for all devices.
Information deletion
Information deletion
Information deletion
Information deletion
Geofund maintains clear screen and clear desk rules.
Geofund maintains clear screen and clear desk rules.
Data Masking
Data Masking
Data Masking
Data Masking
Geofund implements data masking for all PII.
Geofund implements data masking for all PII.
Data leakage prevention
Data leakage prevention
Data leakage prevention
Data leakage prevention
Geofund identifies, labels, and securely stores all sensitive information to prevent data leakage.
Geofund identifies, labels, and securely stores all sensitive information to prevent data leakage.
Information backup
Information backup
Information backup
Information backup
Geofund maintains backups of all user and application data.
Geofund maintains backups of all user and application data.
Redundancy of information processing facilities
Redundancy of information processing facilities
Redundancy of information processing facilities
Redundancy of information processing facilities
Geofund maintains redundant infrastructure as necessary to ensure continuity.
Geofund maintains redundant infrastructure as necessary to ensure continuity.
Logging
Logging
Logging
Logging
Geofund maintains and protects application logs to detect anomolous or erroneous behavior.
Geofund maintains and protects application logs to detect anomolous or erroneous behavior.
Monitoring activities
Monitoring activities
Monitoring activities
Monitoring activities
Geofund monitors networks, systems and applications for anomalous behaviour and addresses anomolous behavior.
Geofund monitors networks, systems and applications for anomalous behaviour and addresses anomolous behavior.
Clock synchronization
Clock synchronization
Clock synchronization
Clock synchronization
Geofund synchonizes system time across all applications to ensure performance.
Geofund synchonizes system time across all applications to ensure performance.
Use of privileged utility programs
Use of privileged utility programs
Use of privileged utility programs
Use of privileged utility programs
Geofund severely limits the use of privileged utility programs to senior engineers with privileged access.
Geofund severely limits the use of privileged utility programs to senior engineers with privileged access.
Installation of software on operational systems
Installation of software on operational systems
Installation of software on operational systems
Installation of software on operational systems
Geofund maintains approval processes to govern the installation of software on application systems.
Geofund maintains approval processes to govern the installation of software on application systems.
Networks security
Networks security
Networks security
Networks security
Geofund strictly manages access to networks containing sensitive information based on employee- and device-level policies.
Geofund strictly manages access to networks containing sensitive information based on employee- and device-level policies.
Security of network services
Security of network services
Security of network services
Security of network services
Geofund defines and implements the security measures that are necessary for individual network services.
Geofund defines and implements the security measures that are necessary for individual network services.
Segregation of networks
Segregation of networks
Segregation of networks
Segregation of networks
Geofund segments its networks into security zones based on business needs and controls traffic between them to ensure strong protection.
Geofund segments its networks into security zones based on business needs and controls traffic between them to ensure strong protection.
Web filtering
Web filtering
Web filtering
Web filtering
Geofund controls access to external websites to reduce exposure to malicious content and protect systems from malware and phishing.
Geofund controls access to external websites to reduce exposure to malicious content and protect systems from malware and phishing.
Use of cryptography
Use of cryptography
Use of cryptography
Use of cryptography
Geofund defines and applies rules for the secure and effective use of cryptography, including robust cryptographic key management practices.
Geofund defines and applies rules for the secure and effective use of cryptography, including robust cryptographic key management practices.
Secure development life cycle
Secure development life cycle
Secure development life cycle
Secure development life cycle
Geofund establishes and enforces secure development rules to ensure security is built into all stages of software and system development.
Geofund establishes and enforces secure development rules to ensure security is built into all stages of software and system development.
Application security requirements
Application security requirements
Application security requirements
Application security requirements
Geofund identifies, specifies, and approves information security requirements for all applications it develops or acquires.
Geofund identifies, specifies, and approves information security requirements for all applications it develops or acquires.
Secure system architecture and engineering principles
Secure system architecture and engineering principles
Secure system architecture and engineering principles
Secure system architecture and engineering principles
Geofund applies secure engineering principles to design, build, and operate all systems securely, following best practices like defense in depth and zero trust.
Geofund applies secure engineering principles to design, build, and operate all systems securely, following best practices like defense in depth and zero trust.
Secure coding
Secure coding
Secure coding
Secure coding
Geofund applies secure coding principles across all software development to reduce security vulnerabilities and ensure robust, secure applications.
Geofund applies secure coding principles across all software development to reduce security vulnerabilities and ensure robust, secure applications.
Security testing in development and acceptance
Security testing in development and acceptance
Security testing in development and acceptance
Security testing in development and acceptance
Geofund integrates security testing throughout the development lifecycle to validate that applications and code meet all information security requirements before production deployment.
Geofund integrates security testing throughout the development lifecycle to validate that applications and code meet all information security requirements before production deployment.
Outsourced development
Outsourced development
Outsourced development
Outsourced development
Geofund closely directs, monitors, and reviews outsourced system development to ensure all security measures and contractual requirements are met.
Geofund closely directs, monitors, and reviews outsourced system development to ensure all security measures and contractual requirements are met.
Separation of development, test and production environments
Separation of development, test and production environments
Separation of development, test and production environments
Separation of development, test and production environments
Geofund maintains strict separation between development, testing, and production environments to protect production systems and data from unauthorized access or compromise.
Geofund maintains strict separation between development, testing, and production environments to protect production systems and data from unauthorized access or compromise.
Change management
Change management
Change management
Change management
Geofund enforces formal change management procedures for all changes to information systems to preserve the confidentiality, integrity, and availability of systems and data.
Geofund enforces formal change management procedures for all changes to information systems to preserve the confidentiality, integrity, and availability of systems and data.
Test information
Test information
Test information
Test information
Geofund carefully selects, protects, and manages test information to ensure relevant, secure testing while safeguarding sensitive operational data.
Geofund carefully selects, protects, and manages test information to ensure relevant, secure testing while safeguarding sensitive operational data.
Protection of information systems during audit testing
Protection of information systems during audit testing
Protection of information systems during audit testing
Protection of information systems during audit testing
Audit tests and other assurance activities involving assessment of operational systems is planned and agreed between the tester and appropriate management.
Audit tests and other assurance activities involving assessment of operational systems is planned and agreed between the tester and appropriate management.
Data Processing Role and Responsibility Identification
Data Processing Role and Responsibility Identification
Data Processing Role and Responsibility Identification
Data Processing Role and Responsibility Identification
Geofund has identified its role and place in the data processing ecosystem, and has identified and documented responsibilities and expectations determined by applicable regulations, obligations, and internal and external factors, entities, and stakeholders, as they apply to its role.
Geofund has identified its role and place in the data processing ecosystem, and has identified and documented responsibilities and expectations determined by applicable regulations, obligations, and internal and external factors, entities, and stakeholders, as they apply to its role.
Vulnerability Assessment and Reporting Policy
Vulnerability Assessment and Reporting Policy
Vulnerability Assessment and Reporting Policy
Vulnerability Assessment and Reporting Policy
Geofund has a defined policy that establishes requirements for vulnerability assessments and reporting.
Geofund has a defined policy that establishes requirements for vulnerability assessments and reporting.
Backup Policy
Backup Policy
Backup Policy
Backup Policy
Geofund has a defined backup policy that establishes the requirements for backup information, software, and systems.
Geofund has a defined backup policy that establishes the requirements for backup information, software, and systems.
Authentication and MFA Control
Authentication and MFA Control
Authentication and MFA Control
Authentication and MFA Control
Username and password (password standard implemented) or SSO are required to authenticate into applications, MFA is optional for external users, and MFA is required for employee users.
Username and password (password standard implemented) or SSO are required to authenticate into applications, MFA is optional for external users, and MFA is required for employee users.
Cloud Infrastructure Security and Compliance Monitoring
Cloud Infrastructure Security and Compliance Monitoring
Cloud Infrastructure Security and Compliance Monitoring
Cloud Infrastructure Security and Compliance Monitoring
Geofund has a system in place to monitor the security and compliance of its cloud infrastructure configuration or performs manual reviews at least annually.
Geofund has a system in place to monitor the security and compliance of its cloud infrastructure configuration or performs manual reviews at least annually.
Continuous Monitoring and Timely Issue Resolution
Continuous Monitoring and Timely Issue Resolution
Continuous Monitoring and Timely Issue Resolution
Continuous Monitoring and Timely Issue Resolution
Geofund conducts continuous monitoring of security controls and addresses issues in a timely manner.
Geofund conducts continuous monitoring of security controls and addresses issues in a timely manner.
Customer Data Segregation
Customer Data Segregation
Customer Data Segregation
Customer Data Segregation
Geofund's customer data is segregated from the data of other customers.
Geofund's customer data is segregated from the data of other customers.
Data Protection Policy Acceptance Monitoring
Data Protection Policy Acceptance Monitoring
Data Protection Policy Acceptance Monitoring
Data Protection Policy Acceptance Monitoring
Geofund has established a Data Protection Policy and requires all employees to accept it upon hire. Management monitors employees' acceptance of the policy.
Geofund has established a Data Protection Policy and requires all employees to accept it upon hire. Management monitors employees' acceptance of the policy.
Encrypted Database Storage
Encrypted Database Storage
Encrypted Database Storage
Encrypted Database Storage
Geofund stores customer data in databases that is encrypted at rest.
Geofund stores customer data in databases that is encrypted at rest.
Least Privilege Public Access Control
Least Privilege Public Access Control
Least Privilege Public Access Control
Least Privilege Public Access Control
Geofund strictly controls access to internal resources based on the principle of least privilege. Public access to resources is always denied by default.
Geofund strictly controls access to internal resources based on the principle of least privilege. Public access to resources is always denied by default.
Hardware Disposal Policy
Hardware Disposal Policy
Hardware Disposal Policy
Hardware Disposal Policy
Geofund has formal policies and procedures in place to guide personnel in the disposal of hardware containing sensitive data.
Geofund has formal policies and procedures in place to guide personnel in the disposal of hardware containing sensitive data.
Email DLP
Email DLP
Email DLP
Email DLP
Geofund uses DLP (Data Loss Prevention) software to prevent unencrypted sensitive information from being transmitted over email.
Geofund uses DLP (Data Loss Prevention) software to prevent unencrypted sensitive information from being transmitted over email.
Approved Port and Protocol Implementation
Approved Port and Protocol Implementation
Approved Port and Protocol Implementation
Approved Port and Protocol Implementation
Geofund uses configurations that ensure only approved networking ports and protocols are implemented, including firewalls.
Geofund uses configurations that ensure only approved networking ports and protocols are implemented, including firewalls.
Server Instance Hardening
Server Instance Hardening
Server Instance Hardening
Server Instance Hardening
Hardening standards are in place to ensure that server instances are appropriately secured.
Hardening standards are in place to ensure that server instances are appropriately secured.
Workstation Antivirus Protection
Workstation Antivirus Protection
Workstation Antivirus Protection
Workstation Antivirus Protection
Geofund requires antivirus software to be installed on workstations to protect the network against malware.
Geofund requires antivirus software to be installed on workstations to protect the network against malware.
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA)
Multi-Factor Authentication (MFA)
Geofund requires two factor authentication to access sensitive systems and applications in the form of user ID, password, OTP and/or certificate.
Geofund requires two factor authentication to access sensitive systems and applications in the form of user ID, password, OTP and/or certificate.
Multi-Zone Data Replication Control
Multi-Zone Data Replication Control
Multi-Zone Data Replication Control
Multi-Zone Data Replication Control
Geofund utilizes multiple availability zones to replicate production data across different zones.
Geofund utilizes multiple availability zones to replicate production data across different zones.
Network Diagram Accessibility and Review
Network Diagram Accessibility and Review
Network Diagram Accessibility and Review
Network Diagram Accessibility and Review
Geofund maintains an accurate network diagram that is accessible to the engineering team and is reviewed by management on an annual basis.
Geofund maintains an accurate network diagram that is accessible to the engineering team and is reviewed by management on an annual basis.
Annual Security Policy Review
Annual Security Policy Review
Annual Security Policy Review
Annual Security Policy Review
Geofund Management reviews security policies on an annual basis.
Geofund Management reviews security policies on an annual basis.
Salted Password Hash Storage
Salted Password Hash Storage
Salted Password Hash Storage
Salted Password Hash Storage
Geofund's application user passwords are stored using a salted password hash.
Geofund's application user passwords are stored using a salted password hash.
Production Release Approval
Production Release Approval
Production Release Approval
Production Release Approval
Geofund ensures that releases are approved by appropriate members of management prior to production release.
Geofund ensures that releases are approved by appropriate members of management prior to production release.
Encrypted Session Transmission
Encrypted Session Transmission
Encrypted Session Transmission
Encrypted Session Transmission
Geofund uses encryption to protect user authentication and admin sessions of the internal admin tool transmitted over the Internet.
Geofund uses encryption to protect user authentication and admin sessions of the internal admin tool transmitted over the Internet.
Security Policy Management and Awareness
Security Policy Management and Awareness
Security Policy Management and Awareness
Security Policy Management and Awareness
Geofund Management has approved security policies, and all employees accept these procedures when hired. Management also ensures that security policies are accessible to all employees and contractors.
Geofund Management has approved security policies, and all employees accept these procedures when hired. Management also ensures that security policies are accessible to all employees and contractors.
Timely Security Communications
Timely Security Communications
Timely Security Communications
Timely Security Communications
Geofund maintains strict separation between development, testing, and production environments to protect production systems and data from unauthorized access or compromise.
Geofund maintains strict separation between development, testing, and production environments to protect production systems and data from unauthorized access or compromise.
Unique Accounts for SSH and No Root Access
Unique Accounts for SSH and No Root Access
Unique Accounts for SSH and No Root Access
Unique Accounts for SSH and No Root Access
SSH users use unique accounts to access production machines. Additionally, the use of the âRootâ account is not allowed.
SSH users use unique accounts to access production machines. Additionally, the use of the âRootâ account is not allowed.
Encrypted Databases
Encrypted Databases
Encrypted Databases
Encrypted Databases
Geofund stores customer data in databases that are encrypted at rest.
Geofund stores customer data in databases that are encrypted at rest.
Data Privacy Controls
CONTROL
STATUS
Consent for PII Collection
Geofund has established a process to obtain consent from a data subject prior to collecting PII. |
Consent Withdrawal Process
Geofund has an established process for acknowledging, logging, and documenting withdrawal of consent.
Geofund Privacy Policy Requirements
Geofund's Privacy Policy includes: Purpose for collecting personal information; Choice and consent; Types of personal information collected; Methods of collection (for example, use of cookies or other tracking techniques); Use, retention, and disposal; Access; Disclosure to third parties; Security for privacy; Quality, including data subjects' responsibilities for quality; Monitoring and enforcement.
Lawful Processing and ROPA
Geofund has an established and documented record of processing activity (ROPA), which includes evidence of lawful collection and use, including defined purpose of processing.
Privacy Program Scope
Geofund has a well-defined documented scope that reflects the boundaries and applicability of its Privacy Program.
Data Subject Rights Management
Geofund has an established process to properly manage data subject rights.
PII Disclosure Reporting and Retention
Geofund properly reports and retains records of PII disclosures to include PII disclosed to third parties, requests for legally-binding PII disclosures, subcontractors or sub-processors used for PII processing in accordance with contractual requirements, and changes in subcontractors.
Data Subject Request Management
Geofund tracks and manages requests from data subjects, and provides a response to valid requests within 30 days.
DPA Management and Compliance
Company has an established process to collect, review, and maintain Data Processing Agreements (DPAs) with all vendors and partners that process personal data, ensuring compliance with applicable data protection laws and contractual requirements.
Privacy Policy Control
Geofund maintains a Privacy Policy that is available to all external users and internal employees, and it details the Geofund's confidentiality and privacy commitments.
Annual Privacy Policy Review
Geofund's management reviews privacy policies and procedures annually to ensure that personal information is used in conformity with the purposes identified in the privacy notice.
Special Category Data Collection Controls
Geofund's record of processing activity (ROPA) includes conditions for allowable collection of special categories of personal data.
PII Processing Impact Assessment
Geofund conducts a data protection impact assessment when required or when planning for the processing of new, or changing the processing of existing, PII.
PII Management Assignment
Geofund has formally assigned an independent and capable member to manage PII-related matters.
PII Transfer Policy
Geofund has established policies and procedures (e.g. Privacy Policy) for the transfer and transmission of PII to a non-EU country or international organization.
Joint PII Controller Roles and Responsibilities
Geofund has determined roles and responsibilities for the processing of PII with joint PII controllers.
Sensitive Information Handling and Disposal
Geofund maintains policies and procedures to properly identify, label and store sensitive information (e.g., PII, PHI, Cardholder Data, etc.), and to manage and document the use, transfer, storage, and disposal of physical media containing sensitive information. Personnel are trained and made aware of how to handle sensitive information and report related incidents.
Data Minimization
Geofund's collection of personal information is limited to that necessary to meet the entity's objectives.
Personal Information Usage Control
Geofund only uses personal information for the purposes identified in the entity's privacy policy.
Clear and Transparent Data Subject Communication
Geofund communicates its obligations to data subjects in a clear and transparent manner.
EU Representative Designation
Geofund, which is a controller/processor not established in the EU, has designated in writing a representative in an EU member state to manage all data processing issues concerning Geofund.
Data Processing Agreement and Technical/Organizational Measures
Geofund has data processing agreements in place with data processing ecosystem parties which include minimum technical and organizational measures designed to meet the objectives of Geofundâs privacy program.
Vulnerability Scanning and Remediation
Geofund engages with third-party to conduct vulnerability scans of the production environment at least quarterly. Results are reviewed by management and high priority findings are tracked to resolution.
Third-Party Personal Information Recipient Listing
Geofund's privacy practices posted on their website include the list of third parties authorized to receive personal information.
Authorized Third-Party PII Access Control
Geofund maintains a documented list of third parties and vendors that are authorized to receive or access PII.