Key Company Policy #5
Software Licensing and Duplication Restrictions Policy Overview
All software installed or used on Company Information Systems, including all desktop and laptop computers, must be lawfully acquired through license, internal or contractor development, or other lawful means.
Key Company Policy #6
Technical Information Security Overview
The Company has a technical security program which ensures the confidentiality, integrity, and availability of the Company’s data on information systems and other technologies. The Company has established and continues to maintain an incident response process. This process includes the timely reporting of security incidents and weaknesses, vulnerabilities, and procedures to maintain the Company’s ability to promptly respond to threats to technologies that store, transmit, or protect Company information assets.