Data Security Measures
Wooly, Inc dba Roster Technologies
This document describes the technical and organizational measures we have adopted to ensure that the data we process is safe in our care.
Subprocessing
2) In each case, and via the DPA’s, Roster will restrict the subprocessors’ access to customer personal data only to what is necessary to assist Roster in providing or maintaining the services and will prohibit the subprocessor from accessing customer personal data for any other purpose.
Security Measures
3) Vulnerability Scans: Roster shall ensure that vulnerability scans are performed on servers continuously and network security scans are completed at a minimum quarterly, in each case using an industry standard vulnerability scanning tool.
4) Employee-Related Policies:
5) Process-Level Requirements: We will implement the following processes to ensure security and privacy:
6) Application-Level Requirements
7) Data-Level Requirements
8) End User Computing Level Requirements
9) Compliance Requirements
10) Role-Based Access Control (RBAC) and Least-Privilege Access
Roster enforces Role-Based Access Control (RBAC) across internal systems and customer-facing applications to ensure that users are granted only the minimum level of access required to perform their responsibilities (principle of least privilege).
Internal Access Controls
Roster personnel access to infrastructure, databases, and administrative tools is restricted based on job function. Access is granted only upon management approval and is reviewed regularly. Controls include: unique user accounts for all personnel, multi-factor authentication (MFA) for administrative systems and production environments, separation between development, staging, and production environments, logged and auditable administrative actions, quarterly access reviews and immediate revocation upon role change or termination, administrative privileges are limited to a small subset of authorized engineers and operations staff. Elevated privileges are granted only when required and removed when no longer necessary.
Customer Account Permissions
Within the Roster platform, customers can assign roles and permissions to members of their organization. These permissions control access to features, data visibility, and actions within the application.
Depending on role assignment, users may be restricted from: managing integrations and API keys, accessing billing or payout information, editing brand settings.
This allows organizations to safely collaborate within Roster while maintaining internal operational controls.
11) Data Classification
Roster classifies data by sensitivity and applies security controls appropriate to each category.
Public
Information intended for public access (e.g., website content and documentation). No authentication required.
Internal
Operational information used by Roster personnel (e.g., internal procedures and system metrics). Access restricted to employees based on job function and logged.
Confidential (Customer Data)
Information customers provide while using the platform, including profiles, collaboration data, messages, and contact information.
Controls include: encryption in transit and at rest, role-based access control (RBAC), access logging and monitoring, restricted employee access
Restricted (Sensitive Data)
Highly sensitive system data such as authentication credentials, API keys, and third-party authorization tokens.
Additional protections: least-privilege access, multi-factor authentication, encrypted storage, continuous monitoring and rapid revocation if compromise is suspected
12) Personnel. Roster restricts its personnel from downloading and/or processing Customer Personal Data without authorization by Roster as set forth in the Security Measures and shall ensure that any person who is authorized by Roster to process Customer Personal Data is under an appropriate obligation of confidentiality.
13) Security Incident Response. Upon becoming aware of a Security Incident, Roster will notify Customer without undue delay and, in any case, where feasible, within seventy-two (72) hours after becoming aware. Roster will provide information relating to the Security Incident as it becomes known or as is reasonably requested by Customer to fulfill its obligations as controller and will also take reasonable steps to contain, investigate, and mitigate any Security Incident.
Security Incident Response
1) Executives will immediately confer with each other and with legal counsel regarding any security incident to ensure compliance with legal and contractual obligations.
2) We will notify the impacted customers, data partners, and other third-parties within seventy-two (72) hours after learning of the incident along with the classification of the incident.
3) We will immediately investigate and mitigate any security incident.
4) Roster will obtain and maintain reasonable insurance to cover itself for cyber liability.
5) Roster will simulate the incident response plan annually