Overview

Geofund is the leading platform to empower businesses with automated product traceability. Our solution empower businesses to automate transaction-level traceability to streamline certifications, and deliver audit-ready chain-of-custody for industrial inputs and sustainable materials globally.

At Geofund, we understand the importance of keeping our customer's information secure. We value security as a top priority and implemented a comprehensive security program. We understand that trust is earned and we are dedicated to earning and maintaining customer trust.

If there is something we can do to earn your trust, let us know at security@geofund.io.

Compliance

Documents

2025 Security Packet

Download

2025 Internal Audit Report

Download

Please submit your email to request for access.

Organizational Controls

CONTROL

STATUS

Policies for information security

Geofund maintains robust security and topical policies that are communicated to key personnel and reviewed at least annually.

Information security roles and responsibilities

Geofund maintains defined security roles and responsibilities that are documented and updated based on organizational needs.

Segregation of duties

Conflicting duties are separated among roles and personnel to mitigate conflicts of interest or bad actors.

Management responsibilities

Geofund requires all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organization.

Contact with authorities

Geofund maintains contact with relevant authorities.

Contact with special interest groups

Geofund maintains contact with special interest groups, specialist security forums, and professional associations.

Threat intelligence

Geofund collects information relating to information security to produce threat intelligence.

Information security in project management

Geofund integrates information security into project management.

Acceptable use of information and other associated assets

Geofund documents and implements rules for the acceptable use and procedures for handling information and other associated assets.

Return of assets

Personnel and other interested parties return all of Geofund's assets in their possession upon change or termination of their employment, contract or agreement.

Classification of information

Geofund classifies information according to the information security needs of the organization based on confidentiality, integrity, availability and relevant interested party requirements.

Labelling of information

Geofund maintains an appropriate set of procedures for information labeling.

Information transfer

Geofund maintains information transfer rules between the organization and other parties.

Access control

Geofund maintains rules to control physical and logical access to information.

Authentication information

Geofund controls allocation and management of authentication information such as passwords, including advising personnel on the appropriate handling of authentication information.

Access rights

Geofund provisions and reviews access rights to information and other associated assets regularly in line with relevant policies.

Information security in supplier relationships

Geofund maintains and enforces a policy on supplier security.

Addressing information security within supplier agreements

Geofund establishes and enforces relevant information security requirements with each supplier based on the type of supplier relationship.

Managing information security in the ICT supply chain

Geofund maintains ICT suppy chain security standards.

Monitoring, review and change management of supplier services

Geofund monitors and responds to changes in supplier security practices.

Information security for use of cloud services

Geofund maintains a policy governing the use of cloud services and relevant security practices.

Information security incident management planning and preparation

Geofund defines and maintains information security incident management roles and responsibilities.

Assessment and decision on information security events

Geofund assesses all information security events and to determine if they are to be categorized as information security incidents.

Response to information security incidents

Geofund responds to information security incidents in accordance with governing procedures.

Learning from information security incidents

Geofund documents lessons learned from all information security incidents to strengthen and improve information security controls.

Collection of evidence

Geofund establishes and implements procedures for the identification, collection, acquisition and preservation of evidence related to information security events.

Information security during disruption

Geofund maintains and reviews contigency plans to maintain information security at appropriate levels during disruptions.

ICT readiness for business continuity

Geofund maintains ICT readiness requirements, including recovery time objectives for key vendors and processes.

Legal, statutory, regulatory and contractual requirements

Geofund documents and complies with legal, statutory, regulatory and contractual requirements relevant to information security.

Intellectual property rights

Geofund stringently protects the intellectual property rights of its customers, partners, and stakeholders.

Protection of records

Geofund maintains record management practices including storage, maintenance, destruction, and access.

Privacy and protection of PII

Geofund stringently protects personally identifiable information in all systems.

Independent review of information security

Geofund's information security policies, procedures and practices are regularly reviewed by third parties including external experts and auditors.

Compliance with policies, rules and standards for information security

Geofund regularly reviews compliance levels with the organization's information security policy, topic-specific policies, rules and standards

Documented operating procedures

Geofund documents key procedures for information security and makes them available when relevant.

Employee Termination Checklist and Asset Return Control

Geofund uses a termination checklist to ensure that an employee's system access, including physical access, is removed within a specified timeframe and all organization assets (physical or electronic) are properly returned.

Vendor Compliance Review

Geofund maintains a directory of its key vendors, including their compliance reports. Critical vendor compliance reports are reviewed annually.

Information Security Roles and Competencies

Geofund has an established list of applicable information security roles and specified skill and competence level required for each role.

Vendor Management Policy

Geofund has a defined vendor management policy that establishes requirements of ensuring third-party entities meet the organization's data preservation and protection requirements.

Business Associate Agreement Policy

Geofund has a defined policy that establishes the requirements related to Business Associate Agreements.

External Communication of Security Commitments

Geofund's security commitments are communicated to external users, as appropriate.

People Controls

People Controls

People Controls

CONTROL

CONTROL

CONTROL

STATUS

STATUS

STATUS

Screening

Screening

Screening

Screening

Geofund conducts background verification checks on all candidates for employment.

Geofund conducts background verification checks on all candidates for employment.

Terms and conditions of employment

Terms and conditions of employment

Terms and conditions of employment

Terms and conditions of employment

Geofund binds all employees to information security practices in the terms and conditions of employment.

Geofund binds all employees to information security practices in the terms and conditions of employment.

Information security awareness, education and training

Information security awareness, education and training

Information security awareness, education and training

Information security awareness, education and training

Geofund provides regular security awareness training to all staff.

Geofund provides regular security awareness training to all staff.

Disciplinary process

Disciplinary process

Disciplinary process

Disciplinary process

Geofund's information security policies, procedures and practices are regularly reviewed by third parties including external experts and auditors.

Geofund's information security policies, procedures and practices are regularly reviewed by third parties including external experts and auditors.

Responsibilities after termination or change of employment

Responsibilities after termination or change of employment

Responsibilities after termination or change of employment

Responsibilities after termination or change of employment

Geofund holds former employees responsible for information security responsibilities even after termination or departure.

Geofund holds former employees responsible for information security responsibilities even after termination or departure.

Confidentiality or non-disclosure agreements

Confidentiality or non-disclosure agreements

Confidentiality or non-disclosure agreements

Confidentiality or non-disclosure agreements

Geofund requires confidentiality and non-disclosure agreements from employees with access to sensitive information.

Geofund requires confidentiality and non-disclosure agreements from employees with access to sensitive information.

Remote working

Remote working

Remote working

Remote working

Geofund implements security measures designed to mitigate remote work risks, such as clear screen and VPN requirements.

Geofund implements security measures designed to mitigate remote work risks, such as clear screen and VPN requirements.

Information security event reporting

Information security event reporting

Information security event reporting

Information security event reporting

Geofund maintains procedures for security event reporting.

Geofund maintains procedures for security event reporting.

Physical Controls

Physical Controls

Physical Controls

CONTROL

CONTROL

CONTROL

STATUS

STATUS

STATUS

Clear desk and clear screen

Clear desk and clear screen

Clear desk and clear screen

Clear desk and clear screen

Geofund maintains clear screen and clear desk rules.

Geofund maintains clear screen and clear desk rules.

Security of assets off-premises

Security of assets off-premises

Security of assets off-premises

Security of assets off-premises

Geofund maintains strict rules around use of devices off premises, including BYOD policies.

Geofund maintains strict rules around use of devices off premises, including BYOD policies.

Technological Controls

Technological Controls

Technological Controls

CONTROL

CONTROL

CONTROL

STATUS

STATUS

STATUS

User endpoint devices

User endpoint devices

User endpoint devices

User endpoint devices

Geofund maintains policies requiring secure handling of user endpoint devices.

Geofund maintains policies requiring secure handling of user endpoint devices.

Privileged access rights

Privileged access rights

Privileged access rights

Privileged access rights

Geofund strictly maintains privileged access permissions among employees.

Geofund strictly maintains privileged access permissions among employees.

Information access restriction

Information access restriction

Information access restriction

Information access restriction

Geofund restricts access to sensitive information on a need-to-know basis.

Geofund restricts access to sensitive information on a need-to-know basis.

Access to source code

Access to source code

Access to source code

Access to source code

Geofund stringently manages read, pull, and write access to all code bases.

Geofund stringently manages read, pull, and write access to all code bases.

Secure authentication

Secure authentication

Secure authentication

Secure authentication

Geofund requires secure authentication procedures on all company systems.

Geofund requires secure authentication procedures on all company systems.

Capacity management

Capacity management

Capacity management

Capacity management

Geofund actively monitors the capacities of information processing systems, such as cloud resources.

Geofund actively monitors the capacities of information processing systems, such as cloud resources.

Protection against malware

Protection against malware

Protection against malware

Protection against malware

Geofund maintains malware prevention practices.

Geofund maintains malware prevention practices.

Management of technical vulnerabilities

Management of technical vulnerabilities

Management of technical vulnerabilities

Management of technical vulnerabilities

Geofund actively monitors and remediates vulnerabilities for all systems in use.

Geofund actively monitors and remediates vulnerabilities for all systems in use.

Configuration management

Configuration management

Configuration management

Configuration management

Geofund enforces secure configuration rules for all devices.

Geofund enforces secure configuration rules for all devices.

Information deletion

Information deletion

Information deletion

Information deletion

Geofund maintains clear screen and clear desk rules.

Geofund maintains clear screen and clear desk rules.

Data Masking

Data Masking

Data Masking

Data Masking

Geofund implements data masking for all PII.

Geofund implements data masking for all PII.

Data leakage prevention

Data leakage prevention

Data leakage prevention

Data leakage prevention

Geofund identifies, labels, and securely stores all sensitive information to prevent data leakage.

Geofund identifies, labels, and securely stores all sensitive information to prevent data leakage.

Information backup

Information backup

Information backup

Information backup

Geofund maintains backups of all user and application data.

Geofund maintains backups of all user and application data.

Redundancy of information processing facilities

Redundancy of information processing facilities

Redundancy of information processing facilities

Redundancy of information processing facilities

Geofund maintains redundant infrastructure as necessary to ensure continuity.

Geofund maintains redundant infrastructure as necessary to ensure continuity.

Logging

Logging

Logging

Logging

Geofund maintains and protects application logs to detect anomolous or erroneous behavior.

Geofund maintains and protects application logs to detect anomolous or erroneous behavior.

Monitoring activities

Monitoring activities

Monitoring activities

Monitoring activities

Geofund monitors networks, systems and applications for anomalous behaviour and addresses anomolous behavior.

Geofund monitors networks, systems and applications for anomalous behaviour and addresses anomolous behavior.

Clock synchronization

Clock synchronization

Clock synchronization

Clock synchronization

Geofund synchonizes system time across all applications to ensure performance.

Geofund synchonizes system time across all applications to ensure performance.

Use of privileged utility programs

Use of privileged utility programs

Use of privileged utility programs

Use of privileged utility programs

Geofund severely limits the use of privileged utility programs to senior engineers with privileged access.

Geofund severely limits the use of privileged utility programs to senior engineers with privileged access.

Installation of software on operational systems

Installation of software on operational systems

Installation of software on operational systems

Installation of software on operational systems

Geofund maintains approval processes to govern the installation of software on application systems.

Geofund maintains approval processes to govern the installation of software on application systems.

Networks security

Networks security

Networks security

Networks security

Geofund strictly manages access to networks containing sensitive information based on employee- and device-level policies.

Geofund strictly manages access to networks containing sensitive information based on employee- and device-level policies.

Security of network services

Security of network services

Security of network services

Security of network services

Geofund defines and implements the security measures that are necessary for individual network services.

Geofund defines and implements the security measures that are necessary for individual network services.

Segregation of networks

Segregation of networks

Segregation of networks

Segregation of networks

Geofund segments its networks into security zones based on business needs and controls traffic between them to ensure strong protection.

Geofund segments its networks into security zones based on business needs and controls traffic between them to ensure strong protection.

Web filtering

Web filtering

Web filtering

Web filtering

Geofund controls access to external websites to reduce exposure to malicious content and protect systems from malware and phishing.

Geofund controls access to external websites to reduce exposure to malicious content and protect systems from malware and phishing.

Use of cryptography

Use of cryptography

Use of cryptography

Use of cryptography

Geofund defines and applies rules for the secure and effective use of cryptography, including robust cryptographic key management practices.

Geofund defines and applies rules for the secure and effective use of cryptography, including robust cryptographic key management practices.

Secure development life cycle

Secure development life cycle

Secure development life cycle

Secure development life cycle

Geofund establishes and enforces secure development rules to ensure security is built into all stages of software and system development.

Geofund establishes and enforces secure development rules to ensure security is built into all stages of software and system development.

Application security requirements

Application security requirements

Application security requirements

Application security requirements

Geofund identifies, specifies, and approves information security requirements for all applications it develops or acquires.

Geofund identifies, specifies, and approves information security requirements for all applications it develops or acquires.

Secure system architecture and engineering principles

Secure system architecture and engineering principles

Secure system architecture and engineering principles

Secure system architecture and engineering principles

Geofund applies secure engineering principles to design, build, and operate all systems securely, following best practices like defense in depth and zero trust.

Geofund applies secure engineering principles to design, build, and operate all systems securely, following best practices like defense in depth and zero trust.

Secure coding

Secure coding

Secure coding

Secure coding

Geofund applies secure coding principles across all software development to reduce security vulnerabilities and ensure robust, secure applications.

Geofund applies secure coding principles across all software development to reduce security vulnerabilities and ensure robust, secure applications.

Security testing in development and acceptance

Security testing in development and acceptance

Security testing in development and acceptance

Security testing in development and acceptance

Geofund integrates security testing throughout the development lifecycle to validate that applications and code meet all information security requirements before production deployment.

Geofund integrates security testing throughout the development lifecycle to validate that applications and code meet all information security requirements before production deployment.

Outsourced development

Outsourced development

Outsourced development

Outsourced development

Geofund closely directs, monitors, and reviews outsourced system development to ensure all security measures and contractual requirements are met.

Geofund closely directs, monitors, and reviews outsourced system development to ensure all security measures and contractual requirements are met.

Separation of development, test and production environments

Separation of development, test and production environments

Separation of development, test and production environments

Separation of development, test and production environments

Geofund maintains strict separation between development, testing, and production environments to protect production systems and data from unauthorized access or compromise.

Geofund maintains strict separation between development, testing, and production environments to protect production systems and data from unauthorized access or compromise.

Change management

Change management

Change management

Change management

Geofund enforces formal change management procedures for all changes to information systems to preserve the confidentiality, integrity, and availability of systems and data.

Geofund enforces formal change management procedures for all changes to information systems to preserve the confidentiality, integrity, and availability of systems and data.

Test information

Test information

Test information

Test information

Geofund carefully selects, protects, and manages test information to ensure relevant, secure testing while safeguarding sensitive operational data.

Geofund carefully selects, protects, and manages test information to ensure relevant, secure testing while safeguarding sensitive operational data.

Protection of information systems during audit testing

Protection of information systems during audit testing

Protection of information systems during audit testing

Protection of information systems during audit testing

Audit tests and other assurance activities involving assessment of operational systems is planned and agreed between the tester and appropriate management.

Audit tests and other assurance activities involving assessment of operational systems is planned and agreed between the tester and appropriate management.

Data Processing Role and Responsibility Identification

Data Processing Role and Responsibility Identification

Data Processing Role and Responsibility Identification

Data Processing Role and Responsibility Identification

Geofund has identified its role and place in the data processing ecosystem, and has identified and documented responsibilities and expectations determined by applicable regulations, obligations, and internal and external factors, entities, and stakeholders, as they apply to its role.

Geofund has identified its role and place in the data processing ecosystem, and has identified and documented responsibilities and expectations determined by applicable regulations, obligations, and internal and external factors, entities, and stakeholders, as they apply to its role.

Vulnerability Assessment and Reporting Policy

Vulnerability Assessment and Reporting Policy

Vulnerability Assessment and Reporting Policy

Vulnerability Assessment and Reporting Policy

Geofund has a defined policy that establishes requirements for vulnerability assessments and reporting.

Geofund has a defined policy that establishes requirements for vulnerability assessments and reporting.

Backup Policy

Backup Policy

Backup Policy

Backup Policy

Geofund has a defined backup policy that establishes the requirements for backup information, software, and systems.

Geofund has a defined backup policy that establishes the requirements for backup information, software, and systems.

Authentication and MFA Control

Authentication and MFA Control

Authentication and MFA Control

Authentication and MFA Control

Username and password (password standard implemented) or SSO are required to authenticate into applications, MFA is optional for external users, and MFA is required for employee users.

Username and password (password standard implemented) or SSO are required to authenticate into applications, MFA is optional for external users, and MFA is required for employee users.

Cloud Infrastructure Security and Compliance Monitoring

Cloud Infrastructure Security and Compliance Monitoring

Cloud Infrastructure Security and Compliance Monitoring

Cloud Infrastructure Security and Compliance Monitoring

Geofund has a system in place to monitor the security and compliance of its cloud infrastructure configuration or performs manual reviews at least annually.

Geofund has a system in place to monitor the security and compliance of its cloud infrastructure configuration or performs manual reviews at least annually.

Continuous Monitoring and Timely Issue Resolution

Continuous Monitoring and Timely Issue Resolution

Continuous Monitoring and Timely Issue Resolution

Continuous Monitoring and Timely Issue Resolution

Geofund conducts continuous monitoring of security controls and addresses issues in a timely manner.

Geofund conducts continuous monitoring of security controls and addresses issues in a timely manner.

Customer Data Segregation

Customer Data Segregation

Customer Data Segregation

Customer Data Segregation

Geofund's customer data is segregated from the data of other customers.

Geofund's customer data is segregated from the data of other customers.

Data Protection Policy Acceptance Monitoring

Data Protection Policy Acceptance Monitoring

Data Protection Policy Acceptance Monitoring

Data Protection Policy Acceptance Monitoring

Geofund has established a Data Protection Policy and requires all employees to accept it upon hire. Management monitors employees' acceptance of the policy.

Geofund has established a Data Protection Policy and requires all employees to accept it upon hire. Management monitors employees' acceptance of the policy.

Encrypted Database Storage

Encrypted Database Storage

Encrypted Database Storage

Encrypted Database Storage

Geofund stores customer data in databases that is encrypted at rest.

Geofund stores customer data in databases that is encrypted at rest.

Least Privilege Public Access Control

Least Privilege Public Access Control

Least Privilege Public Access Control

Least Privilege Public Access Control

Geofund strictly controls access to internal resources based on the principle of least privilege. Public access to resources is always denied by default.

Geofund strictly controls access to internal resources based on the principle of least privilege. Public access to resources is always denied by default.

Hardware Disposal Policy

Hardware Disposal Policy

Hardware Disposal Policy

Hardware Disposal Policy

Geofund has formal policies and procedures in place to guide personnel in the disposal of hardware containing sensitive data.

Geofund has formal policies and procedures in place to guide personnel in the disposal of hardware containing sensitive data.

Email DLP

Email DLP

Email DLP

Email DLP

Geofund uses DLP (Data Loss Prevention) software to prevent unencrypted sensitive information from being transmitted over email.

Geofund uses DLP (Data Loss Prevention) software to prevent unencrypted sensitive information from being transmitted over email.

Approved Port and Protocol Implementation

Approved Port and Protocol Implementation

Approved Port and Protocol Implementation

Approved Port and Protocol Implementation

Geofund uses configurations that ensure only approved networking ports and protocols are implemented, including firewalls.

Geofund uses configurations that ensure only approved networking ports and protocols are implemented, including firewalls.

Server Instance Hardening

Server Instance Hardening

Server Instance Hardening

Server Instance Hardening

Hardening standards are in place to ensure that server instances are appropriately secured.

Hardening standards are in place to ensure that server instances are appropriately secured.

Workstation Antivirus Protection

Workstation Antivirus Protection

Workstation Antivirus Protection

Workstation Antivirus Protection

Geofund requires antivirus software to be installed on workstations to protect the network against malware.

Geofund requires antivirus software to be installed on workstations to protect the network against malware.

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

Geofund requires two factor authentication to access sensitive systems and applications in the form of user ID, password, OTP and/or certificate.

Geofund requires two factor authentication to access sensitive systems and applications in the form of user ID, password, OTP and/or certificate.

Multi-Zone Data Replication Control

Multi-Zone Data Replication Control

Multi-Zone Data Replication Control

Multi-Zone Data Replication Control

Geofund utilizes multiple availability zones to replicate production data across different zones.

Geofund utilizes multiple availability zones to replicate production data across different zones.

Network Diagram Accessibility and Review

Network Diagram Accessibility and Review

Network Diagram Accessibility and Review

Network Diagram Accessibility and Review

Geofund maintains an accurate network diagram that is accessible to the engineering team and is reviewed by management on an annual basis.

Geofund maintains an accurate network diagram that is accessible to the engineering team and is reviewed by management on an annual basis.

Annual Security Policy Review

Annual Security Policy Review

Annual Security Policy Review

Annual Security Policy Review

Geofund Management reviews security policies on an annual basis.

Geofund Management reviews security policies on an annual basis.

Salted Password Hash Storage

Salted Password Hash Storage

Salted Password Hash Storage

Salted Password Hash Storage

Geofund's application user passwords are stored using a salted password hash.

Geofund's application user passwords are stored using a salted password hash.

Production Release Approval

Production Release Approval

Production Release Approval

Production Release Approval

Geofund ensures that releases are approved by appropriate members of management prior to production release.

Geofund ensures that releases are approved by appropriate members of management prior to production release.

Encrypted Session Transmission

Encrypted Session Transmission

Encrypted Session Transmission

Encrypted Session Transmission

Geofund uses encryption to protect user authentication and admin sessions of the internal admin tool transmitted over the Internet.

Geofund uses encryption to protect user authentication and admin sessions of the internal admin tool transmitted over the Internet.

Security Policy Management and Awareness

Security Policy Management and Awareness

Security Policy Management and Awareness

Security Policy Management and Awareness

Geofund Management has approved security policies, and all employees accept these procedures when hired. Management also ensures that security policies are accessible to all employees and contractors.

Geofund Management has approved security policies, and all employees accept these procedures when hired. Management also ensures that security policies are accessible to all employees and contractors.

Timely Security Communications

Timely Security Communications

Timely Security Communications

Timely Security Communications

Geofund maintains strict separation between development, testing, and production environments to protect production systems and data from unauthorized access or compromise.

Geofund maintains strict separation between development, testing, and production environments to protect production systems and data from unauthorized access or compromise.

Unique Accounts for SSH and No Root Access

Unique Accounts for SSH and No Root Access

Unique Accounts for SSH and No Root Access

Unique Accounts for SSH and No Root Access

SSH users use unique accounts to access production machines. Additionally, the use of the “Root” account is not allowed.

SSH users use unique accounts to access production machines. Additionally, the use of the “Root” account is not allowed.

Encrypted Databases

Encrypted Databases

Encrypted Databases

Encrypted Databases

Geofund stores customer data in databases that are encrypted at rest.

Geofund stores customer data in databases that are encrypted at rest.

Data Privacy Controls

CONTROL

STATUS

Consent for PII Collection

Geofund has established a process to obtain consent from a data subject prior to collecting PII.

Consent Withdrawal Process

Geofund has an established process for acknowledging, logging, and documenting withdrawal of consent.

Geofund Privacy Policy Requirements

Geofund's Privacy Policy includes: Purpose for collecting personal information; Choice and consent; Types of personal information collected; Methods of collection (for example, use of cookies or other tracking techniques); Use, retention, and disposal; Access; Disclosure to third parties; Security for privacy; Quality, including data subjects' responsibilities for quality; Monitoring and enforcement.

Lawful Processing and ROPA

Geofund has an established and documented record of processing activity (ROPA), which includes evidence of lawful collection and use, including defined purpose of processing.

Privacy Program Scope

Geofund has a well-defined documented scope that reflects the boundaries and applicability of its Privacy Program.

Data Subject Rights Management

Geofund has an established process to properly manage data subject rights.

PII Disclosure Reporting and Retention

Geofund properly reports and retains records of PII disclosures to include PII disclosed to third parties, requests for legally-binding PII disclosures, subcontractors or sub-processors used for PII processing in accordance with contractual requirements, and changes in subcontractors.

Data Subject Request Management

Geofund tracks and manages requests from data subjects, and provides a response to valid requests within 30 days.

DPA Management and Compliance

Company has an established process to collect, review, and maintain Data Processing Agreements (DPAs) with all vendors and partners that process personal data, ensuring compliance with applicable data protection laws and contractual requirements.

Privacy Policy Control

Geofund maintains a Privacy Policy that is available to all external users and internal employees, and it details the Geofund's confidentiality and privacy commitments.

Annual Privacy Policy Review

Geofund's management reviews privacy policies and procedures annually to ensure that personal information is used in conformity with the purposes identified in the privacy notice.

Special Category Data Collection Controls

Geofund's record of processing activity (ROPA) includes conditions for allowable collection of special categories of personal data.

PII Processing Impact Assessment

Geofund conducts a data protection impact assessment when required or when planning for the processing of new, or changing the processing of existing, PII.

PII Management Assignment

Geofund has formally assigned an independent and capable member to manage PII-related matters.

PII Transfer Policy

Geofund has established policies and procedures (e.g. Privacy Policy) for the transfer and transmission of PII to a non-EU country or international organization.

Joint PII Controller Roles and Responsibilities

Geofund has determined roles and responsibilities for the processing of PII with joint PII controllers.

Sensitive Information Handling and Disposal

Geofund maintains policies and procedures to properly identify, label and store sensitive information (e.g., PII, PHI, Cardholder Data, etc.), and to manage and document the use, transfer, storage, and disposal of physical media containing sensitive information. Personnel are trained and made aware of how to handle sensitive information and report related incidents.

Data Minimization

Geofund's collection of personal information is limited to that necessary to meet the entity's objectives.

Personal Information Usage Control

Geofund only uses personal information for the purposes identified in the entity's privacy policy.

Clear and Transparent Data Subject Communication

Geofund communicates its obligations to data subjects in a clear and transparent manner.

EU Representative Designation

Geofund, which is a controller/processor not established in the EU, has designated in writing a representative in an EU member state to manage all data processing issues concerning Geofund.

Data Processing Agreement and Technical/Organizational Measures

Geofund has data processing agreements in place with data processing ecosystem parties which include minimum technical and organizational measures designed to meet the objectives of Geofund’s privacy program.

Vulnerability Scanning and Remediation

Geofund engages with third-party to conduct vulnerability scans of the production environment at least quarterly. Results are reviewed by management and high priority findings are tracked to resolution.

Third-Party Personal Information Recipient Listing

Geofund's privacy practices posted on their website include the list of third parties authorized to receive personal information.

Authorized Third-Party PII Access Control

Geofund maintains a documented list of third parties and vendors that are authorized to receive or access PII.

© 2025 Geofund. All rights reserved

© 2025 Geofund. All rights reserved

© 2025 Geofund. All rights reserved

© 2025 Geofund. All rights reserved