Wilmore Holdings Inc.
Security Policies
Effective Date: February 25, 2026
Version: 1.0
Company: Wilmore Holdings Inc.
1. Purpose
This Information Security & Data Protection Policy establishes the framework by which Wilmore Holdings Inc. protects personal data, customer information, and company systems. The objective is to ensure confidentiality, integrity, and availability of information while maintaining compliance with contractual and legal obligations.
2. Scope
This policy applies to all systems, devices, infrastructure, and personnel involved in processing or accessing company or customer data.
3. Access Control & Least Privilege
Access to systems and personal data is restricted based on role and business necessity. Users are granted the minimum permissions required to perform their duties.
- Administrative privileges are limited.
- Access requires documented business justification.
- Permissions are reviewed periodically.
- Shared credentials are avoided.
4. Security Baseline Controls
The organization maintains operational security controls including:
- Strong password complexity requirements.
- Multi-factor authentication where supported.
- Automatic screen locking on company-managed devices.
- Secure device configurations.
- Routine software and system updates.
5. Data Classification & Encryption
Information is categorized according to sensitivity and business impact.
- Sensitive data transmitted externally is protected using secure protocols such as HTTPS/TLS.
- Data at rest is protected using encryption mechanisms provided by hosting and infrastructure providers where supported.
6. Vulnerability & Threat Management
Systems are maintained to reduce exposure to known threats.
- Software updates and security patches are applied regularly.
- Systems are monitored for suspicious or unauthorized activity.
- Identified vulnerabilities are prioritized and remediated within reasonable timeframes.
7. Incident Response
Security incidents are handled according to defined procedures.
- Incidents are identified, assessed, and contained promptly.
- Root cause analysis is conducted where appropriate.
- Corrective actions are implemented to prevent recurrence.
8. Data Breach Notification
If a suspected or confirmed incident impacts personal data:
- An internal investigation is conducted immediately.
- Relevant stakeholders, sellers, or partners are notified as required by law or contractual obligations.
- Remediation measures are implemented to mitigate impact.
9. Personal Data Protection
Personal data is processed only for legitimate business purposes.
- Data minimization principles are applied.
- Access is restricted to authorized personnel.
- Personal data is not sold.
10. Data Retention & Deletion
Customer data is retained only as long as necessary to fulfill operational, contractual, or legal obligations.
- Upon termination of services, customer data in our possession is deleted within a reasonable timeframe unless retention is legally required.
- Deletion processes are designed to prevent unauthorized recovery.
11. Policy Review
This policy is reviewed periodically and updated as necessary to reflect operational, legal, or regulatory changes.
12. Contact
For security or privacy inquiries, please contact:
[email protected]