Trust Center
Last Updated: Sep 25, 2024
By using this website, You agree to the following privacy policy. Please read them carefully before using this website. We are at Like It System LLC. dba LikeIT Social respect Your privacy. This Privacy Policy is designed to explain how We collect, use, share, and protect the personal information You provide to Us when you access Our website, purchase Our goods or services, or engage with Us on social media, as well as Your own rights to the information we collect. Please read this Privacy Policy carefully. We will alert You to any changes to this Policy by changing the “last updated” date at the top of this Policy. Any changes become effective immediately upon publication on Our website, and You waive specific notice of any changes to the Policy by continuing to use and access Our site(s). We encourage You to review this Privacy Policy periodically when You use Our website for any purpose or engage with Us on social media. You are deemed to have accepted any changes to any revised Privacy Policy by Your continued use of Our website after the revised Privacy Policy is posted.
Certification
GDPR and CCPA/CPRA
Likeit Social ensures its privacy program complies with the General Data Protection Regulation (GDPR) applicable to the European Union and the United Kingdom, as well as the California Consumer Privacy Act (CCPA) and its subsequent amendment, the California Privacy Rights Act (CPRA).
Payment Card Industry (PCI)
Likeit Social maintains PCI DSS compliance through a PCI SAQ A self-assessment. We fully outsource our cardholder data processing to third-party payment processors who are PCI-approved and compliant with PCI DSS Level 1 standards.
IT Security Policy
introduction
Since 2019, Likeit Social has been committed to helping businesses enhance their marketing efforts, build stronger customer relationships, make informed decisions, and create beloved brands. We manage social pages with a focus on customer success and support.
Reliability & Availability
- Minimizing Downtime: Our systems are designed for fault tolerance, and our teams are trained for rapid incident recovery. We avoid both planned and unplanned downtime whenever possible.
- Business Continuity: Disaster recovery and business continuity are integral to our practices.
- Uptime: We maintain a KPI of 99% uptime, consistently achieving higher than 99% over the past 6 and 12 months.
- Customer Transparency: Customers can subscribe to receive immediate SMS or email notifications for any incidents.
Data Management
- Social Media Feeds: Our data ingest layer connects to multiple social network APIs with redundancy and support from Facebook, Twitter, Instagram, and LinkedIn.
- Backups: Regular, encrypted backups are stored in Microsoft Azure with high durability and availability.
Operational Excellence
- Multidisciplinary Analysis: We conduct blameless post-mortems and continually improve our systems and procedures.
- Isolation: Our backend platform uses isolation design patterns to mitigate risks.
- Recovery Objectives: Strategies provide up-to-date RPOs and low RTOs, meeting customer expectations.
- DevOps Best Practices: Infrastructure-as-code enables rapid and consistent system recovery.
Monitoring & Support
- Continuous Monitoring: We monitor our technical environments in real-time globally.
- On-Call Support: Specialized engineers are on call 24/7/365 to address issues promptly.
Data Centers
- Hosting: Our products are hosted by Microsoft Azure, offering secure, highly available, and compliant facilities.
- Data Location: Customer data is hosted in Azure's us-east-1.
- Facilities: Azure data centers have robust physical hosting capabilities, including power backup and redundancy.
IT & Physical Security
- IT Security: Includes forced open door alarms, intrusion detection systems, and media destruction per NIST standards.
- Physical Security: Strict physical access controls with continuous monitoring and multi-factor authentication.
Infrastructure & Network Security
- Dedicated Security Team: Monitors and alerts 24/7/365 for security and operational events.
- Network Controls: Segmented private network with increasing levels of control.
Incident Management
- Response Planning: Based on NIST standards, with prompt investigation and remediation of incidents.
- Scanning: Regular scans for common vulnerabilities.
- Encryption: Uses HTTPS with TLS 1.2+ and AES-256 encryption for data at rest.
System Administration
- Best Practices: Least privilege, central configuration management, and stringent firewall policies.
- Patching: Regular automatic server patches, with manual application of high-priority patches.
Product Security Features
- Multi-Factor Authentication (MFA): Supports TOTP and HOTP apps for additional security.
- Secure Credential Storage: Passwords are salted, hashed, and cannot be viewed by anyone.
- Brute-Force Protections: Implemented with computationally challenging hashing and rate-limiting protections.
- Approval Workflows: Allows for task division with central decision-maker control.
- IP Restrictions: Configurable to restrict access from specific IP ranges.
- Single Sign-On (SSO): Supports SAML 2.0 for unified login credentials.
Likeit Social Incident Management Policy
Introduction
At Likeit Social, we prioritize the security and integrity of our systems and data. This Incident Management Policy outlines our procedures for identifying, managing, and responding to security incidents to minimize impact and ensure prompt resolution.
Purpose
The purpose of this policy is to ensure a consistent and effective approach to managing incidents, including security breaches, system failures, and data leaks. It aims to protect Likeit Social's assets, maintain customer trust, and comply with relevant legal and regulatory requirements.
Scope
This policy applies to all employees, contractors, and third-party service providers who manage, use, or access Likeit Social systems and data.
Definitions
- Incident: Any event that compromises the confidentiality, integrity, or availability of Likeit Social's systems or data.
- Incident Response Team (IRT): A group of designated personnel responsible for managing and resolving incidents.
- Critical Incident: An incident that significantly impacts business operations, customer data, or regulatory compliance.
Roles and Responsibilities
- Incident Response Team (IRT):
- Lead the incident management process.
- Coordinate communication among stakeholders.
- Ensure proper documentation of the incident and response actions.
- Employees:
- Report any suspected incidents immediately.
- Assist in the investigation and resolution of incidents as required.
- Third-Party Service Providers:
- Report incidents that affect Likeit Social systems or data.
- Cooperate with the IRT in incident management and resolution.
Incident Management Process
- Identification and Reporting
- Detection: Continuously monitor systems for potential incidents using automated tools and manual processes.
- Reporting: Report any suspected incidents immediately to the IRT via the designated incident reporting channels (email, phone, or incident management system).
- Classification
- Initial Assessment: The IRT conducts an initial assessment to determine the nature and impact of the incident.
- Classification: Incidents are classified based on their severity:
- High: Critical incidents requiring immediate attention.
- Medium: Significant incidents with moderate impact.
- Low: Minor incidents with limited impact.
- Containment
- Immediate Actions: Take immediate steps to contain the incident and prevent further damage.
- Short-term and Long-term Containment: Implement short-term measures to stabilize the situation and plan for long-term containment to address underlying issues.
- Eradication
- Root Cause Analysis: Investigate the root cause of the incident.
- Removal: Eliminate the root cause and any malicious activities from the affected systems.
- Recovery
- System Restoration: Restore affected systems to normal operation.
- Validation: Verify the integrity of affected systems and data to ensure they are secure.
- Documentation and Reporting
- Incident Documentation: Maintain detailed records of the incident, including timelines, actions taken, and lessons learned.
- Internal Reporting: Provide regular updates to senior management and stakeholders on the status and resolution of the incident.
- External Reporting: Notify regulatory authorities and affected customers as required by law and contractual obligations.
- Post-Incident Review
- Review: Conduct a post-incident review to analyze the incident and response.
- Lessons Learned: Identify and implement improvements to prevent future incidents.
Training and Awareness
- Employee Training: Provide regular training to employees on incident management procedures and their roles in the process.
- Awareness Programs: Conduct awareness programs to promote a culture of security and proactive incident reporting.
Policy Review
This policy will be reviewed annually or after significant incidents to ensure its effectiveness and alignment with best practices and regulatory requirements.
Compliance
Non-compliance with this policy may result in disciplinary action, including termination of employment or contracts.
Likeit Social Change Control Policy and Supporting Procedures
Introduction
At Likeit Social, we recognize the importance of maintaining control over changes to our systems and infrastructure to ensure stability, security, and compliance. This Change Control Policy outlines the procedures for managing changes to our IT environment, including software, hardware, and network configurations.
Purpose
The purpose of this policy is to establish a structured approach for managing changes to Likeit Social’s IT environment. This ensures that changes are properly reviewed, tested, approved, implemented, and documented to minimize risk and impact on business operations.
Scope
This policy applies to all changes to Likeit Social's IT systems, infrastructure, applications, and networks. It is relevant to all employees, contractors, and third-party service providers involved in the change management process.
Definitions
- Change: Any addition, modification, or removal that could impact IT services, systems, or infrastructure.
- Change Request (CR): A formal proposal for a change, detailing the nature, rationale, and impact of the change.
- Change Advisory Board (CAB): A group of stakeholders responsible for reviewing and approving change requests.
- Emergency Change: A change that needs to be implemented urgently to address a critical issue or vulnerability.
Roles and Responsibilities
- Change Requester:
- Submit change requests with detailed information.
- Participate in the review and approval process.
- Change Manager:
- Oversee the change management process.
- Ensure proper documentation and communication of changes.
- Change Advisory Board (CAB):
- Review, assess, and approve or reject change requests.
- Ensure changes align with business objectives and compliance requirements.
- Implementer:
- Execute the approved change.
- Ensure proper testing and validation of the change.
- Reviewer:
- Review the change post-implementation to ensure it meets the desired outcomes and identify any issues.
Change Management Process
- Change Request Submission
- Documentation: The Change Requester completes a Change Request (CR) form, detailing the nature, rationale, impact, and rollback plan for the change.
- Submission: The completed CR form is submitted to the Change Manager for initial review.
- Initial Review and Classification
- Initial Assessment: The Change Manager reviews the CR for completeness and accuracy.
- Classification: The Change Manager classifies the change based on its potential impact and urgency:
- Standard Change: Pre-approved and low-risk changes.
- Normal Change: Changes requiring CAB review and approval.
- Emergency Change: Urgent changes requiring expedited approval.
- Change Review and Approval
- CAB Review: The Change Advisory Board (CAB) reviews normal and emergency changes. They assess the risks, benefits, and alignment with business objectives.
- Approval: The CAB approves or rejects the change request. If approved, the Change Manager schedules the change implementation.
- Change Implementation
- Planning: The Implementer develops a detailed implementation plan, including testing and validation steps.
- Execution: The Implementer carries out the change according to the plan, ensuring minimal disruption to services.
- Testing and Validation: The Implementer tests the change to confirm it functions as expected and does not introduce new issues.
- Post-Implementation Review
- Review: The Reviewer assesses the change post-implementation to ensure it achieved the desired outcomes.
- Documentation: The Change Manager updates the change record with the results of the review and any lessons learned.
- Emergency Change Process
- Urgent Review: Emergency changes are reviewed and approved by a subset of the CAB or designated emergency change approvers.
- Fast-Track Implementation: Emergency changes are implemented immediately to address the critical issue.
- Post-Implementation Review: Emergency changes.
Likeit Social Acceptable Use Policy
Introduction
At Likeit Social, we are committed to ensuring a secure, respectful, and productive environment for all users of our systems and services. This Acceptable Use Policy (AUP) outlines the acceptable and unacceptable behaviors regarding the use of Likeit Social's IT resources, including networks, systems, software, and data.
Purpose
The purpose of this policy is to provide guidelines for the appropriate use of Likeit Social's IT resources to protect the organization, its users, and its data from risks including unauthorized access, data breaches, and legal issues.
Scope
This policy applies to all employees, contractors, consultants, temporary staff, and other users who have access to Likeit Social's IT resources.
Acceptable Use
Users are expected to use Likeit Social's IT resources responsibly and ethically. Acceptable use includes, but is not limited to:
- Performing job-related tasks and responsibilities.
- Accessing and using authorized systems, software, and data.
- Protecting the confidentiality, integrity, and availability of Likeit Social's data.
- Complying with all applicable laws, regulations, and company policies.
Unacceptable Use
Unacceptable use of Likeit Social's IT resources includes, but is not limited to:
- Unauthorized access to systems, data, or networks.
- Sharing login credentials or allowing unauthorized individuals to access IT resources.
- Engaging in activities that disrupt or degrade the performance of IT systems or networks.
- Using IT resources for illegal activities or to violate the rights of others.
- Downloading, sharing, or distributing copyrighted material without proper authorization.
- Installing or using unauthorized software or hardware.
- Engaging in harassing, discriminatory, or abusive behavior.
- Accessing, storing, or transmitting obscene or offensive content.
- Bypassing or attempting to bypass security controls.
- Using IT resources for personal financial gain or commercial purposes unrelated to Likeit Social.
Security and Confidentiality
Users are responsible for safeguarding the security and confidentiality of Likeit Social's IT resources and data. This includes:
- Use strong, unique passwords and change them regularly.
- Locking or logging out of devices when unattended.
- Report any security incidents, breaches, or suspicious activities immediately to the IT department.
- Complying with data protection policies and procedures.
Monitoring and Enforcement
Likeit Social reserves the right to monitor the use of its IT resources to ensure compliance with this policy. Monitoring activities may include, but are not limited to, reviewing network traffic, accessing logs, and auditing systems. Violations of this policy may result in disciplinary action, including termination of employment, and may be reported to law enforcement authorities if illegal activities are involved.
Policy Review
This policy will be reviewed annually or as needed to ensure its effectiveness and alignment with best practices and legal requirements.
Compliance
Compliance with this policy is mandatory. Non-compliance may result in disciplinary action, including termination of employment or contracts, and may lead to legal action if warranted.
Acknowledgment
All users must acknowledge their understanding and acceptance of this policy. This acknowledgment can be in the form of a signed document or an electronic agreement.
By adhering to this Acceptable Use Policy, users contribute to a secure and productive IT environment at Likeit Social.
Likeit Social Flaw Remediation Policy
Introduction
At Likeit Social, we are committed to maintaining the highest standards of security and integrity for our systems and data. This Flaw Remediation Policy outlines the procedures for identifying, assessing, prioritizing, and resolving security vulnerabilities and flaws within our IT environment.
Purpose
The purpose of this policy is to ensure a structured and timely approach to remediating security vulnerabilities and flaws to protect Likeit Social’s assets, maintain customer trust, and comply with relevant legal and regulatory requirements.
Scope
This policy applies to all software, systems, applications, and networks within Likeit Social's IT environment. It is relevant to all employees, contractors, and third-party service providers involved in the management, development, and maintenance of these IT resources.
Definitions
- Vulnerability: A weakness in a system, application, or network that could be exploited to compromise security.
- Patch: A piece of software designed to update, fix, or improve a computer program or its supporting data.
- Remediation: The process of fixing or mitigating a vulnerability or flaw.
- Risk Assessment: The process of identifying and evaluating risks associated with a vulnerability.
Roles and Responsibilities
- Security Team:
- Monitor for new vulnerabilities and threats.
- Conduct vulnerability assessments and penetration tests.
- Coordinate the remediation process.
- IT Operations Team:
- Implement patches and fixes as directed.
- Ensure systems are up-to-date and secure.
- Development Team:
- Address vulnerabilities in internally developed applications.
- Follow secure coding practices to prevent new vulnerabilities.
- Third-Party Service Providers:
- Notify Likeit Social of any vulnerabilities in their products or services.
- Cooperate in the remediation process.
Vulnerability Management Process
- Identification
- Monitoring: Continuously monitor vulnerability databases, security advisories, and threat intelligence sources for new vulnerabilities.
- Scanning: Regularly conduct automated vulnerability scans and manual assessments of systems, applications, and networks.
- Assessment
- Initial Triage: Conduct an initial assessment to determine the severity and potential impact of the identified vulnerability.
- Classification: Classify vulnerabilities based on their severity:
- Critical: Immediate threat to the organization; requires urgent remediation.
- High: Significant threat; requires prompt remediation.
- Medium: Moderate threat; requires remediation in a reasonable timeframe.
- Low: Minimal threat; monitor and remediate as part of regular maintenance.
- Prioritization
- Risk Assessment: Evaluate the risk associated with each vulnerability, considering factors such as exploitability, potential impact, and exposure.
- Prioritization: Prioritize vulnerabilities for remediation based on their severity and risk assessment.
- Remediation
- Patch Management: Apply security patches and updates to affected systems, applications, and networks.
- Configuration Changes: Implement configuration changes to mitigate vulnerabilities where patches are not available.
- Code Fixes: Update and fix code in internally developed applications to address vulnerabilities.
- Testing: Test patches, configuration changes, and code fixes to ensure they effectively mitigate the vulnerability without introducing new issues.
- Verification
- Post-Remediation Scanning: Conduct follow-up scans and assessments to verify that vulnerabilities have been successfully remediated.
- Validation: Ensure that remediation efforts have not adversely affected system functionality or performance.
- Documentation and Reporting
- Record Keeping: Maintain detailed records of identified vulnerabilities, risk assessments, remediation actions, and validation results.
- Reporting: Provide regular reports on the status of vulnerability management to senior management and stakeholders.
- Continuous Improvement
- Review: Conduct periodic reviews of the vulnerability management process to identify areas for improvement.
Contact Us
If you have any questions about these Terms and Conditions, You can contact us:
By email: it@likeitsocial.com By visiting our contact page.
By phone number: (404)556-4640
By visiting us at: 925 North Point Pkwy Suite 130 Alpharetta, GA, 30005