← Back to FolioTalk

FolioTalk Information Security Policy (ISP)

Effective Date: February 21, 2026 Last Updated: February 21, 2026

1. Purpose

This Information Security Policy establishes the security standards, practices, and responsibilities for FolioTalk to protect the confidentiality, integrity, and availability of user data and system resources.

2. Scope

This policy applies to all systems, data, and personnel involved in the development, deployment, and operation of FolioTalk, including: - Production and staging environments - Source code repositories - Third-party service integrations (Plaid, Google OAuth) - All team members and contractors with system access

3. Data Classification

Classification Description Examples Handling Requirements
Confidential Sensitive financial and authentication data Plaid access tokens, user financial holdings, JWT signing keys Encrypted at rest and in transit; access restricted to production systems only
Internal Operational data not meant for public disclosure Server logs, API keys, database credentials Access restricted to authorized personnel; not shared externally
Public Information intended for public access Privacy policy, marketing content, public documentation No special handling required

4. Encryption Standards

4.1 Data in Transit

4.2 Data at Rest

4.3 Key Management

5. Authentication and Authorization

5.1 User Authentication

5.2 System Authentication

5.3 Authorization

6. Infrastructure Security

6.1 Production Environment

6.2 Dependency Management

6.3 Source Code Security

7. Incident Response

7.1 Incident Classification

Severity Description Examples Response Time
Critical Active data breach or system compromise Unauthorized access to user data, exposed credentials Immediate (within 1 hour)
High Potential security vulnerability actively exploited Suspicious API activity, authentication bypass Within 4 hours
Medium Security vulnerability identified but not exploited Dependency vulnerability, misconfiguration Within 24 hours
Low Minor security improvement needed Log verbosity, non-critical hardening Within 1 week

7.2 Incident Response Procedure

  1. Detection: Identify and confirm the incident through monitoring, alerts, or reports
  2. Containment: Isolate affected systems to prevent further damage
  3. Assessment: Determine the scope, impact, and root cause
  4. Notification:
  5. Affected users are notified within 72 hours of confirmed data breach
  6. Plaid is notified per contractual obligations
  7. Regulatory authorities are notified as required by law
  8. Remediation: Fix the root cause and restore affected systems
  9. Post-Incident Review: Document lessons learned and update security practices

7.3 Plaid-Specific Incident Response

8. Vulnerability Management

9. Backup and Recovery

10. Security Awareness

11. Compliance

FolioTalk commits to: - Plaid's security requirements for production data access - Applicable data protection regulations - Industry-standard security practices

12. Policy Review

This policy is reviewed and updated: - At least annually - After any security incident - When significant changes to the system architecture are made

13. Contact

Report security concerns or incidents to: - Email: hello@folio.talk