What are Organizational Cybersecurity Policies, Processes, and Procedures (GV.PO)?

eXpress badging has developed comprehensive cybersecurity policies and procedures tailored to our organizational context, risk management strategy, and business priorities.​ (formerly ID.GV-1)

GV.PO-01: Establishing and Communicating Cybersecurity Policies

eXpress badging has developed comprehensive cybersecurity policies and procedures tailored to our organizational context, risk management strategy, and business priorities.​

Key Elements:

  • Alignment with Organizational Context: Policies are crafted considering our mission to provide secure ID badging solutions across various sectors, including healthcare, government, education, and enterprise.​

  • Risk-Based Approach: Our policies prioritize risk management, focusing on data confidentiality, system availability, and service integrity, reflecting our low-risk tolerance for security breaches and compliance failures.​

  • Core Policy Areas:

    • Data Protection and Encryption Standards

    • User Access and Identity Management

    • Incident Response and Reporting

    • Third-Party and Vendor Risk Management

    • Disaster Recovery and Business Continuity

    • PII and PCI Data Handling Protocols

    • Secure Development and Change Management for the Veonics Portal​

  • Communication and Accessibility: All policies are documented in the eXpress badging Knowledge Base (HubSpot), accessible to authorized personnel, and reviewed during employee onboarding and regular cybersecurity awareness training sessions.​


GV.PO-02: Extending Cybersecurity Policies to Suppliers

eXpress badging ensures that our cybersecurity standards are upheld across our supply chain.​

Key Practices:

  • Supplier Security Assessments: We evaluate suppliers to ensure they have appropriate cybersecurity controls consistent with our internal standards, especially those handling sensitive data.​

  • Contractual Obligations: Supplier agreements mandate adherence to our security, confidentiality, data protection, and incident reporting requirements.​

  • Reliance on Certified Partners: We partner with vendors like AWS and AT&T, selected for their compliance with recognized standards (e.g., SOC 2 Type II reports), ensuring end-to-end supply chain security.​

  • Ongoing Oversight: Vendors undergo periodic reassessments, with security obligations embedded into Service Level Agreements (SLAs) and Non-Disclosure Agreements (NDAs).​


GV.PO-03: Reviewing and Updating Cybersecurity Policies

To maintain the relevance and effectiveness of our cybersecurity policies, eXpress badging follows a structured review process.​

Review Process:

  • Annual Reviews: All cybersecurity policies and procedures are reviewed at least annually by the Security and Compliance Team, incorporating updates due to:

    • Changes in regulatory requirements (e.g., GDPR, CCPA, PCI DSS)

    • Emerging cybersecurity threats and vulnerabilities

    • Technological advancements or changes in organizational mission​

  • Trigger-Based Updates: Policies are updated in response to significant events such as security incidents, technology upgrades, major service changes, or findings from penetration tests and audits.​

  • Stakeholder Communication: Policy changes are communicated through email announcements, updates in the Knowledge Base, and discussions during quarterly security awareness sessions to ensure all stakeholders are informed.​

  • Audit Readiness: Documentation of all reviews, changes, and communications is maintained to ensure preparedness for internal and external cybersecurity audits.​


This structured approach ensures that eXpress badging's cybersecurity policies remain robust, up-to-date, and effectively communicated, aligning with the NIST CSF GV.PO categories.​