Genesys Cloud security policy
Genesys Cloud Service Terms and Conditions for Security
These “Genesys Cloud Security Terms” are incorporated by this reference into your Genesys Cloud Service Terms and Conditions agreement with Us and describe the contractual requirements for information security and data protection provided by Us to You related to the provision of Genesys Cloud Services that You have licensed from Us. These terms are applicable to the extent that We have access and control over Customer Data.
1 Security Program
1.1 Security Standards. We have implemented and will maintain an information security program that follows generally accepted system security principles embodied in the ISO 27001 standard designed to protect Customer Data as appropriate to the nature and scope of the Genesys Cloud Services provided.
1.2 Security Awareness and Training. We have developed and will maintain an information security and awareness program that is delivered to all employees and appropriate contractors at the time of hire or contract commencement and annually thereafter. The awareness program is delivered electronically and includes a testing aspect with minimum requirements to pass.
1.3 Policies and Procedures. We will maintain appropriate policies and procedures to support the information security program. Policies and procedures will be reviewed annually and updated as necessary.
1.4 Change Management. We will utilize a change management process based on Industry Standards to ensure that all changes to the Cloud Services Environment are appropriately reviewed, tested, and approved.
1.5 Data Storage and Backup. We will create backups of critical Customer Data according to documented backup procedures. Customer Data will be stored and maintained solely on designated backup storage media within the Data Center(s). Backup data will not be stored on portable media. Customer Data stored on backup media will be protected from unauthorized access
1.6 Anti-Virus and Anti-Malware Protection. We will utilize Industry Standard anti-virus and anti-malware protection solutions to ensure that all non-Linux servers in Your Cloud Services Environment are appropriately protected against malicious software such as trojan horses, viruses, and worms. We will use Industry Standard practices to ensure that the Genesys Cloud Services as delivered to You does not include any program, routine, subroutine, or data (including malicious software or “malware,” viruses, worms, and Trojan Horses) that are designed to disrupt the proper operation of the Genesys Cloud Services, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause the Genesys Cloud Services to be destroyed, damaged or rendered inoperable. You acknowledge that the use of license keys will not be a breach of this section.
1.7 Vulnerability and Patch Management. We will maintain a vulnerability management program that ensures compliance with the standards of Our information security program.
1.8 Data Destruction. We and Our subcontractors will follow Industry Standard processes to destroy obsolete data and retired equipment that formerly held Customer Data.
1.9 Penetration Testing. On at least an annual basis, We will conduct a vulnerability assessment and penetration testing engagement with an independent qualified vendor. Issues identified during the engagement will be appropriately addressed within a reasonable time-frame commensurate with the identified risk level of the issue. A cleansed version of the executive summary of the test results will be made available to You upon written request and will be subject to non-disclosure and confidentiality agreements.
2 Network Security
2.1 Network Controls. We will employ effective network security controls based on Industry Standards to ensure that Customer Data is segmented and isolated from other customer environments within the Data Center. Controls include, but are not limited to:
(A) Firewall Services. We use firewall services to protect the Genesys Cloud Services infrastructure. We maintain granular ingress and egress rules and changes must be approved through Our change management system.
(B) Intrusion Detection System. We have implemented intrusion detection systems across the Genesys Cloud Services Environments which may be either network based, host based or a combination of the two.
(C) No Wireless Networks. We will not use wireless networks within the Genesys Cloud Services Environments.
(D) Data Connections between You and the Genesys Cloud Services Environment. We use TLS, VPN and/or MPLS circuits to secure connections between browsers, client apps, and mobile apps to the Genesys Cloud Services. Connections traversing an untrusted network (e.g. the Internet) will use TLS.
(E) Data Connections between Genesys Cloud Services Environment and Third Parties. Transmission or exchange of Customer Data with You and any third parties authorized by You to receive the Customer Data will be conducted using secure methods (e.g. TLS, HTTPS, SFTP).
(F) Encrypted Recordings. We encrypt call recordings and chat sessions. We may elect to implement a unique password, known only to You, to protect the encryption keys used to secure the call recordings and chat sessions. You are responsible for keeping sensitive data out of the recordings via the Genesys Cloud Services interface, such as using the pause functionality.
(G) Encryption Protection. We use Industry Standard methods to support encryption.
(H) Logging and Monitoring. We will log security events from the operating perspective for all servers providing the Genesys Cloud Services to You. We will monitor and investigate events that may indicate a security incident or problem. Event records will be retained one year.
3 User Access Control
3.1 Access Control. We will implement appropriate access controls to ensure only authorized Users have access to Customer Data within the Genesys Cloud Services Environment.
3.2 Your User Access. You are responsible for managing User access controls within the application. You define the usernames, roles, and password characteristics (length, complexity, and expiration timeframe) for its users. You are entirely responsible for any failure by itself, its agents, contractors or employees (including without limitation all its users) to maintain the security of all usernames, passwords and other account information under its control. Except in the event of a security lapse caused by Our gross negligence or willful action or inaction, You are entirely responsible for all use of the Genesys Cloud Services through Your usernames and passwords whether or not authorized by You and all charges resulting from such use.
You will immediately notify Us if You become aware of any unauthorized use of the Genesys Cloud Services.
3.3 Our User Access. We will create individual User accounts for each of Our employees or contractors that have a business need to access Customer Data or Your systems within the Genesys Cloud Services Environment. The following guidelines will be followed regarding Our user account management:
(A) User accounts are requested and authorized by Our management.
(B) Strong password controls are systematically enforced.
(C) Connections are required to be made via secure VPN using strong passwords that expire every ninety (90) days.
(D) Session time-outs are systematically enforced.
(E) User accounts are promptly disabled upon employee termination or role transfer, eliminating a valid business need for access.
4 Business Continuity and Disaster recovery
4.1 Disruption Protection. The Genesys Cloud Services will be deployed and configured in a high-availability design and the Genesys Cloud Services will be deployed across separate Data Centers to provide optimal availability of the Genesys Cloud Services. The Genesys Cloud Services Environment is physically separated from Our corporate network environment so that a disruption event involving the corporate environment does not impact the availability of the Genesys Cloud Services.
4.2 Business Continuity. We will maintain a corporate business continuity plan designed to ensure that ongoing monitoring and support services will continue in the event of a disruption event involving the corporate environment.
4.3 Disaster Recovery. The Genesys Cloud Services will be deployed in a high-availability, redundant design. You are responsible for defining specific parameters regarding fail-over. With regard to the Genesys Cloud Service, We employ an active-active-active configuration
5 Security Incident Response
5.1 Security Incident Response Program. We will maintain a Security Incident response program based on Industry Standards designed to identify and respond to suspected and actual Security Incidents involving Customer Data. The program will be reviewed, tested and, if necessary, updated on at least an annual basis. “Security Incident” means a confirmed event resulting in the unauthorized use, deletion, modification, disclosure, or access to Customer Data.
5.2 Notification. In the event of a Security Incident or other security event requiring notification under applicable law, We will notify You within thirty-six (36) hours and will reasonably cooperate so that You can make any required notifications relating to such event, unless We are specifically requested by law enforcement or a court order not to do so.
5.3 Notification Details. We will provide the following details regarding any Security Incidents to You: (i) date that the Security Incident was identified and confirmed; (ii) the nature and impact of the Security Incident; (iii) actions We have already taken; (iv) corrective measures to be taken; and (v) evaluation of alternatives and next steps.
5.4 Ongoing Communications. We will continue providing appropriate status reports to You regarding the resolution of the Security Incident, continually work in good faith to correct the Security Incident and to prevent future such Security Incidents. We will cooperate, as reasonably requested by You, to further investigate and resolve the Security Incident.
6 Data Center Protections
6.1 Data Center. We contract with third-party providers for Data Center space. Data Center providers and related services are reviewed on an annual basis to ensure that they continue to meet Our needs and Yours. Each Data Center provider maintains certification based on its independent business models. Security and compliance certifications and/or attestation reports for the Data Center(s) relevant to Your Genesys Cloud Services will be provided upon written request and may require additional non-disclosure agreements to be executed.
6.2 Physical Security. Each Data Center is housed within a secure and hardened facility with the following minimum physical security requirements: (a) secured and monitored points of entry; (b) surveillance cameras in facility; (c) on-site access validation with identity check; (d) access only to persons on an access list approved by Us; (e) on-site network operations center staffed 24x7x365.
6.3 Environmental Controls. Each Data Center is equipped to provide redundant external electrical power sources, redundant uninterruptible power supplies, backup generator power and redundant temperature and humidity controls.
7 Use of the Genesys Cloud Services
7.1 You will not, and will not permit or authorize others to, use the Genesys Cloud Services for any of the following: (i) to violate applicable Law; (ii) to transmit Malicious Code; (iii) to transmit 911 or any emergency services (or reconfigure to support or provide such use); (iv) to interfere with, unreasonably burden, or disrupt the integrity or performance of the Genesys Cloud Services or third-party data contained therein; (v) to attempt to gain unauthorized access to systems or networks; or (vi) to provide the Genesys Cloud Services to non-User third parties, including, by resale, license, lend or lease.
7.2 You will use commercially reasonable efforts to prevent and/or block any prohibited use by Users.
7.3 You will maintain any reasonable, appropriate administrative, physical, and technical level of security regarding its account ID, password, antivirus and firewall protections, and connectivity with the Genesys Cloud Services.
7.4 You shall maintain strict security over all VoIP Services lines. You acknowledge that We do not provide You the ability to reach 911 or other emergency services and You agree to inform any individuals who may be present where the Genesys Cloud Services are used, or who use the Genesys Cloud Services, of the non-availability of 911 or other emergency dialing.
7.5 If the Genesys Cloud Services will be used to transmit or process Personal Data, You will ensure that all Personal Data is captured and used solely via the use of available Security Features.
7.6 Recordings. As between Us and You, You acknowledge that use of Recordings is solely within Your discretion and control. Without limiting the foregoing: (i) You accept sole responsibility for determining the method and manner of performing recording such that it is compliant with all applicable Laws and for instructing the services accordingly; and (ii) You shall ensure that Recordings shall be made only for diagnostic, quality assurance, archival, and/or Support purposes, and in any event only for purposes required and/or in compliance with, all applicable Laws. You will ensure that (a) Recordings will not knowingly include any bank account number, credit card number, authentication code, Social Security number or Personal Data, except as allowed or required by all applicable Laws; or (v) Recordings are encrypted at all times. To the extent Recordings are encrypted or where encryption is electable by You as part of the Genesys Cloud Services, You shall elect such encryption. You shall not modify, disable, or circumvent the Recording encryption feature within the Genesys Cloud Services and shall otherwise ensure that it will use the Genesys Cloud Services in compliance with the encryption feature.
8 Industry-Specific Certifications
Our security and operational controls are based on Industry Standard practices and are certified to meet the guidelines indicated in the table below. Nevertheless, you are solely responsible for achieving and maintaining any industry-specific certifications required for your business:
|Cloud Service||PCI||SOC2 TYPE II||ISO 27001||ISO 27018||HIPAA||SIG FULL||SIG LITE||PRIVACY SHIELD|
Subject to Our reasonable confidentiality and information security policies, You or a qualified third party chosen by You, shall have the right, not more than once a year and upon thirty (30) days’ written notice, to perform a security assessment of Our compliance with the terms of these Genesys Cloud Security Terms, provided that You have demonstrated that You have a reasonable belief that We are not in compliance. During normal business hours, You or Your authorized representatives may inspect Our policies and practices implemented to comply with these Genesys Cloud Security Terms, which may include a site visit and a review of reasonable supporting documentation, provided that You agree that such right shall not include the right to on-site inspections or audits of Our third-party hosting facilities and equipment. No such assessment shall violate Our obligations of confidentiality to customers or reveal Our Intellectual Property. Any assessment performed pursuant to this Section shall not interfere with the normal conduct of Our business. We shall cooperate in a commercially reasonable manner with any such assessment and reserve the right to charge You for Our reasonable costs incurred in connection with any such assessment.
11 Customer Data
11.1 As between Genesys and You, You retain ownership of and all intellectual property rights in Customer Data and grant Us a non-exclusive, non-sublicenseable (except to parties working on Our behalf), non-transferable, royalty-free license to access, process, store, transmit, and otherwise make use of the Customer Data as necessary to provide the Services and to otherwise fulfill Our obligations under the Agreement.
11.2 You agree that the Customer Data may be transferred or stored outside the country where You and Your customers are located in order to carry out the Services and Our other obligations under the Agreement.
11.3 You represent and warrant that You have obtained all consents necessary for Us to collect, access, process, store, transmit, and otherwise use Customer Data in accordance with the Agreement.
You shall comply with all requirements of integrity, quality, legality and all other similar aspects in respect of Customer Data. We may, but are not obligated to, review or monitor any Customer Data. We expressly disclaim any duty to review or determine the legality, accuracy or completeness of Customer Data.
11.4 We have developed and will maintain a privacy program designed to respect and protect Customer Data under our control. We will not rent or sell any Customer Data.
11.5 We may use data and information related to the performance, operation and use of the Cloud Services to create statistical analyses, to perform benchmarking, to perform research and development and to perform other similar activities (“Service Improvements”). We will not incorporate Customer Data in Service Improvements in a form that could identify You or Your customers. Genesys will use industry standard techniques to anonymize Customer Data prior to performing Service Improvements unless otherwise consented to by You. Customer Data will, at all times, be subject to the security controls set forth in these Genesys Cloud Security Terms. Service Provider retains all intellectual property rights in Service Improvements and may make them publicly available.
For purposes of these Genesys Cloud Security Terms, the following defined terms shall have the meaning set forth below.
Customer Data: Your proprietary information and information about your customers (including Personal Data) submitted through the Cloud Services by You or Your Users. Customer Data does not include Service Improvements as defined in 9.
Data Center: a data center where We house the Genesys Cloud Services Environment.
Industry Standard(s): generally accepted cloud information security practices as reflected in Genesys’s policies and procedures.
Personal Data: any information relating to Your customers that is protected by applicable privacy law.
Genesys Cloud Services: Our proprietary Genesys Cloud Services as made available to You in the Cloud Services Environment.
Genesys Cloud Services Environment: the Genesys-controlled infrastructure, including equipment, servers and software, within Data Centers used to provide the Genesys Cloud Services.
User: An individual who (i) is authorized by You and has been supplied a user identification and password(s) by You to access the Cloud Services on Your behalf.
|August 13, 2019||Updated policy.|
|August 7, 2019||Updated table in section 8 for new ISO certifications.|
|July 22, 2019||Updated policy. Added new Definitions section.|
|March 20, 2019||Added Revision history table.|
|February 21, 2019||Updated policy.|