IT Service Alliance, along with its affiliates: PARSEC Group, BCL Mainframe Services, and Salem Automation, recognizes that the confidentiality, integrity, and availability of the information and data we create, maintain, and host are essential to our success and to protecting the privacy of our partners.
As a service provider, we understand the importance of transparency in our security practices, tools, resources, and shared responsibilities, ensuring our customers can trust IT Service Alliance as a secure and reliable partner.
This Security Posture outlines the key measures we take to identify and mitigate risks, implement industry best practices, and continuously strengthen our security and compliance framework.
Founded in 2024
Here are the important security policies and documents which are a part of IT Service Alliance’s compliance program.
Access Control Policy
Policy
Code of Business Conduct Policy
Policy
Data Breach Notification Policy
Policy
Compliance Policy
Policy
HR Security Policy
Policy
Asset Management Policy
Policy
Encryption Policy
Policy
Vendor Management Policy
Policy
Information Security Policy
Policy
Vendor Management Procedure
Policy
SDLC Procedure
Policy
Data Retention Policy
Policy
Network Security Procedure
Policy
Personal Data Breach Notification Procedure
Policy
Physical & Environmental Security Policy
Policy
Incident Management Procedure
Policy
Acceptable Usage Policy
Policy
Data Classification Policy
Policy
Incident Management Policy
Policy
Physical and Environmental Security Procedure
Policy
PHI Data breach Notification Procedure
Policy
Access Control Procedure
Policy
Business Continuity Plan
Policy
Business Continuity & Disaster Recovery Policy
Policy
Communications & Network Security Policy
Policy
Operations Security Procedure
Policy
HR Security Procedure
Policy
Privacy By Design Policy
Policy
Media Disposal Policy
Policy
Data Protection Policy
Policy
Organization of Information Security Policy
Policy
Asset Management Procedure
Policy
Risk Assessment & Management Policy
Policy
System Acquisition and Development Lifecycle Policy
Policy
Compliance Procedure
Policy
Endpoint Security Policy
Policy
ISMS Information Security Roles & Responsibilities
Policy
ISMS Scope Document
Policy
ISMS Manual
Policy
System Description
Policy
Operation Security Policy
Policy
ITSA ISO27001 Audit Report
Document
SOC 2 Type II Report
Document