Data Privacy & Security Plan

1. Outline how you will implement applicable data security and
privacy contract requirements over the life of the Contract.
GameSalad follows security best
practices including regular security
review, training, encryption of data in
motion and at rest. Where available,
third-party systems access has 2FA
enabled.
2. Specify the administrative, operational and technical safeguards
and practices that you have in place to protect PII.
GameSalad encrypts data in motion
and at rest. Employee administrative
interfaces do not show non-email PII by
default.
PII usage is optional and client is given
options for use of platform without
providing PII.
3. Address the training received by your employees and any
subcontractors engaged in the provision of services under the
Contract on the federal and state laws that govern the
confidentiality of PII.
Employees receive quarterly training
on cybersecurity best practices.
4. Outline contracting processes that ensure that your employees
and any subcontractors are bound by written agreement to the
requirements of the Contract, at a minimum.
Employee policy include the need to
comply with contracts.
5. Specify how you will manage any data security and privacy
incidents that implicate PII and describe any specific plans you
have in place to identify breaches and/or unauthorized
disclosures, and to meet your obligations to report incidents to the
EA.
Security incidents are verified and
reported within 48 ours of company
being informed or discovering the
breach via email.

If investigation continues after 48 ours,
customer will be informed of the
extent of the breach and data included
as soon as possible.

Systems have alerts that automatically
notify system admins of unusual
activity and all activity is investigated.
6. Describe how data will be transitioned to the EA when no longer
needed by you to meet your contractual obligations, if applicable.
In most cased data will not be
transitioned but erased. If data is
requested, it will be transferred via
secure FTP or an expiring Dropbox link,
as per agreement with requester.
7. Describe your secure destruction practices and how certification
will be provided to the EA.
No special security measures are in
place for data destruction. Accounts
are deactivated and PII is removed
from database records. PII will not be
removed from database backups due
to infeasibility, but data backups have a
rotation schedule ensuring eventual
full deletion.
8. Outline how your data security and privacy program/practices
align with the EA’s applicable policies.
Company regularly evaluates it’s
security practices alignment with the
NIST CSF v1.1 security framework.