Talkdesk Organizational Security

By Steve Bell
0 min read

Security is one of the most critical aspects of any enterprise cloud contact center. Talkdesk understands that the confidentiality, integrity and availability of our customers’ data is vital to your business operations and our own success.
This blog post is the first in a four-part series outlining Talkdesk’s security policies. In this post, we cover Talkdesk’s approach to organizational security.
Security Team Structure
The Talkdesk Security Department consists of two functions/teams:
- The Information Security team is responsible for governance, risk, compliance, second line of defense, ownership of the Information Security Management System and overall security program management.
- The Engineering Security team is responsible for vulnerability management, incident detection and response, appsec assurance, management of security tools, security architecture solutions and monitoring throughout multiple stages of our software development life cycle.
Security Policies
Talkdesk has an Information Security Management System (ISMS) aligned with ISO 27001 framework that includes policies and procedures to allow a systematic approach to protecting company information and assets from internal and external threats, reducing risk levels.
These policies are readily available to all employees and include governance and risk management, human resources security, security of systems and facilities, operations management, incident management, business continuity management, monitoring and security testing and privacy.
Confidentiality Agreements
All Talkdesk partners and employees, upon joining the company and/or during their employment period, as well as certain service providers, are required to sign a non-disclosure and confidentiality agreements, demonstrating their commitment to the company and its information security principles.
Privacy
Ensuring customers’ data is used only in a manner consistent with their expectations is a responsibility we take very seriously. We back our privacy guidelines with layers of security to safeguard their data.