LEGAL

Security Measures

 
 

Effective Date: May 10, 2018

Capitalized terms that are not defined in these Security Measures have the meanings set forth in the Terms of Service or the Data Processing Addendum.

 

Security Overview

Game Enders has a dedicated security team that guides the implementation of controls, processes, and procedures governing the security of Game Enders and its customers. The Game Enders security team is responsible for developing, implementing and maintaining an information security program that reflects the following principles:

  • Align security activities with Game Enders’s strategies and support Game Enders’s objectives.
  • Leverage security to facilitate confidentiality, integrity, and availability of data and assets.
  • Utilize Game Enders’s security resources efficiently and effectively.
  • Utilize monitoring and metrics to facilitate adequate performance of security related activities.
  • Manage security utilizing a risk based approach.
  • Implement measures designed to manage risks and potential impacts to an acceptable level.
  • Leverage industry security frameworks where relevant and applicable.
  • Leverage compliance/assurance processes as necessary.
  • Analyze identified or potential threats to Game Enders and its customers, provide reasonable remediation recommendations, and communicate results as appropriate.  

Data Center Security, Availability, and Disaster Recovery

  • Game Enders leverages leading data center providers to house our physical infrastructure.  
  • Our data center providers utilize an array of security equipment, techniques and procedures designed to control, monitor, and record access to the facilities.
  • We have implemented solutions designed to protect against and mitigate effects of DDoS attacks.    
  • Game Enders maintains geographically separate data centers to facilitate infrastructure and service availability and continuity.

Application Level Security

  • Game Enders hashes passwords for user accounts and provides SSL for customers.  
  • Game Enders utilizes Web Application Firewall (WAF) technology.

Incident Response

  • We analyze identified or potential threats to Game Enders and its customers, provide reasonable remediation recommendations, and communicate results as appropriate.

Systems Access Control

  • Access to Game Enders systems is limited to appropriate personnel.
  • Game Enders subscribes to the principle of least privilege (e.g., employees, system accounts, vendors, etc. are provided with the least amount of access for their job function).