Legal

Information Security Policy

Company Name: Bloom Industries Inc. | Effective Date: 11/11/2025 | Last Updated: 01/01/2026

1. Purpose

The purpose of this Information Security Policy is to establish standards and responsibilities for protecting the confidentiality, integrity, and availability of company information systems, customer data, and business assets.

This policy applies to all employees, contractors, systems, applications, and third-party services used by the company.

2. Scope

This policy covers:

This policy applies to all production, staging, and development environments.

3. Roles & Responsibilities

Information Security Officer (ISO)

The Information Security Officer is responsible for:

Employees & Contractors

All personnel are responsible for:

4. Data Classification

Company data is classified into the following categories:

Confidential data must be protected with appropriate technical and organizational controls.

5. Access Control

6. Authentication & Credential Management

7. Data Protection & Encryption

8. Application Security

9. Third-Party & Vendor Security

The company uses reputable third-party service providers for infrastructure and functionality, including but not limited to:

Vendors are selected based on security posture, industry reputation, and compliance commitments. Vendor access is limited to the minimum required.

10. AI & Data Processing

11. Logging & Monitoring

12. Incident Response

In the event of a suspected security incident:

  1. The issue is promptly investigated
  2. Impacted systems may be isolated
  3. Affected users or partners are notified when legally or contractually required
  4. Remediation steps are taken to prevent recurrence

All incidents are documented and reviewed.

13. Data Retention & Deletion

14. Business Continuity & Availability

15. Policy Review & Updates

This policy is reviewed at least annually or upon significant changes to systems, regulations, or business operations.

16. Compliance

This policy supports compliance with:

Acknowledgment

All personnel are expected to comply with this Information Security Policy. Violations may result in disciplinary action or termination of access.