Scootcabs.ca Legal Portal
Legal
Last Updated: January 12, 2024
1.1 Purpose
The purpose of this Information Security Policy (this “Policy”) is to establish a comprehensive framework for protecting the integrity, confidentiality, and availability of information within the operations of the SCOOT CAB app and associated platforms. As a trusted provider in the transportation industry, ensuring riders and end-users (collectively “users”), and all critical systems’ data security and privacy is paramount in maintaining stakeholders’ trust and confidence.
1.2 Scope
This Policy applies to all employees, contractors, partners, and all parties who have access to the information assets and systems supporting the SCOOT CAB app. It comprises the entire information cycle – from collection and processing to storage and deletion.
1.3 Objectives
The main objectives of this Policy are to:
1.4 Overview
The SCOOT CAB app provides seamless transportation services for a lot of users daily. As we embrace technological advancements and the digital transformation of the transportation industry, the importance of robust information security practices cannot be overemphasized. This Policy provides a set of standards and guidelines to mitigate potential risks, secure our digital assets, and respond to incidents effectively.
Information security is a shared responsibility, and all persons interacting with the SCOOT CAB app ecosystem are expected to comply with the principles outlined in this Policy. Regular training, proactive measures, and communication will be implemented to ensure ongoing compliance.
By complying with this Policy, we demonstrate our commitment to protecting our users’ trust, and we are maintaining the integrity of SCOOT CAB and the information it processes.
2.1 Classification levels
All information within the SCOOT CAB app ecosystem shall be classified according to their sensitivity and criticality. The below classification level is established:
2.2 Access controls
Access controls matching the classification levels outlined above will be implemented to ensure the integrity and confidentiality of information. Access privileges will be granted based on the principles of least privilege – meaning individuals will have the minimum access necessary to perform their job functions.
Classification level | Access | Control measures |
---|---|---|
Internal information | Open to the public | None beyond the practices described in our Technology Risk Management and Cybersecurity Policy document. |
Public information | Limited to authorized employees and contractors | User authentication, role-based access controls (RBAC), and regular access reviews |
Confidential information | Limited to individuals with legitimate needs and appropriate authority. | Strong user authentication, RBAC with explicit permissions, encryption (in transit and at rest), and audit trails. |
2.3 Handling and transmission of information
2.4 Data retention and disposal |
All information should be retained in accordance with the organization’s data retention policy (as described in the appropriate document). Any information that is no longer required or reaches its retention period must be securely deleted using the approved methods to prevent it from getting into the wrong hands.
2.5 Training and awareness
All individuals with access to information will receive training on the proper handling and classification of information. Regular awareness campaigns will reinforce the importance of maintaining the integrity and confidentiality of information.
3.1 Strong authentication
In ensuring the security of user accounts and preventing unauthorized access, SCOOT CAB will enforce the use of strong authentication mechanisms. This may include the implementation of multi-factor authentication for all accounts. multi-factor authentication adds an additional layer of security by requiring users to provide multiple forms of identification before gaining access to their accounts.
3.2 Password policy
The following robust password policy will be applied for the protection of user accounts.
Additional information may be provided on your profile, including your photo. Drivers are mandated to submit their photos when they register. This will be optional for Riders.
3.3 Account recovery
If a user forgets their login credentials, a secure and verified account recovery process will be established. This process will involve multi-step verification to confirm the user’s identity before they are allowed access to their account.
3.4 Session management
To mitigate the risk of unauthorized access due to session hijacking, SCOOT CAB will implement secure session management practices. This may include session timeouts, secure cookie attributes, and re-authentication for sensitive transactions.
3.5 Third-party authentication
For any third-party authentication service used, such as social media login plugin options, they will be carefully vetted for security and privacy considerations. If implemented, these services must meet stringent security standards and comply with all relevant privacy and data protection laws.
3.6 Employee access review
For any third-party authentication service used, such as social media login plugin options, they will be carefully vetted for security and privacy considerations. If implemented, these services must meet stringent security standards and comply with all relevant privacy and data protection laws.
3.7 Loggin and monitoring
All authentication attempts, including if successful or not, will be logged and monitored. Suspicious activities will trigger alerts for immediate investigation and response.
4.1 In-transit encryption
SCOOT CAB will implement strong in-transit encryption to protect information as it travels between end users, drivers, and servers. All communication channels, including user app interactions, API communications, and data transfers will use Transport Layer Security (TLS) or a comparable encryption standard. This ensures that information remains protected from eavesdropping and man-in-the-middle attacks.
4.2 At-rest encryption
Sensitive information stored on servers and mobile devices will be subject to robust at-rest encryption measures to prevent unauthorized access in the event of physical theft or unauthorized system access. Key management, encryption systems, and storage practices will comply with industry standards to maintain confidentiality.
4.3 Encryption key management
SCOOT CAB will establish secure management practices, including:
4.4 Encryption for communication APIs
All communication interfaces and APIs used on the SCOOT CAB app will employ encryption mechanisms. This may include, without limitation, payment gateways, communication with third-party services, and external systems. Integration third parties must adhere to encryption standards to ensure a secure exchange of information.
4.5 Mobile device encryption
Mobile devices used by drivers and end users for interacting with the SCOOT CAB app will have encryption measures. This may include both device-level and application-level encryptions to safeguard information stored on the device and data shared between their device and our servers.
4.6 Periodic encryption audits
In the event of an emergency requiring access to encryption data, the documented emergency access procedures will be followed. The procedures will involve proper documentation, authorization, and oversight to mitigate risks associated with emergency access.
4.7 Emergency access procedures
In the event of an emergency requiring access to encryption data, the documented emergency access procedures will be followed. The procedures will involve proper documentation, authorization, and oversight to mitigate risks associated with emergency access.
5.1 Device management
SCOOT CAB will implement a Mobile Device Management (MDM) system to enforce security policies, manage device configurations, and ensure compliance with security standards. The key aspects of MDM may include enrolling all devices in the MDM system before accessing the SCOOT CAB app, remotely wiping off sensitive information in the event of a stolen or lost mobile device to prevent unauthorized access, securely configuring all devices, and detecting rooted devices.
5.2 App security
Regular updates and security assessments will be performed to identify vulnerabilities. These may include regular app updates, code reviews, and penetration testing.
5.3 Device authentication and authorization
Each user will be authenticated on mobile devices following the authentication principles described in section 3 above.
5.4 Mobile app permissions
Only required permissions will be requested from mobile devices. And each permission will have its defined purposes. Users will have the right to grant or deny specific permissions.
5.5 Secure communication channels
Communications between the SCOOT CAB app and our servers, as well as third-party services, will be encrypted using industry-standard protocols. This includes information transmitted during ride requests, authentication, and payment transactions.
5.6 Security awareness for mobile users
Users will receive guidance on maintaining the security of their devices. This may include best practices for setting strong passwords, enabling device encryption, and keeping the SCOOT CAB app and device operating system up to date.
SCOOT CAB has established an Incident Response Plan that describes the step-by-step procedures to be followed in the event of a security incident. This plan may include incident identification, reporting, response, investigation, containment, eradication, recovery, and communication. All incidents relating to the SCOOT CAB app shall follow the Incident Response Plan document. The Incident Response Plan will be regularly reviewed and updated to adapt to emerging threats, technological changes, and organizational developments.
SCOOT CAB has established a Disaster Recovery Plan (DRP) that outlines strategies and procedures for the recovery of critical business functions and IT systems in the event of a disaster or major disruption. The DRP document includes, but is not limited to, the following key components:
SCOOT CAB has developed a Backup and Restoration Procedure document that outlines our procedures for backing up and restoring data. SCOOT CAB will back up and restore data in accordance with the Backup Restoration Procedure document.
9.1 Device management
SCOOT CAB is committed to upholding the privacy and rights of its users. The collection, processing, and storage of personal information will comply with applicable privacy and data protection laws, especially the Personal Information Protection and Documents Act (PIPEDA), and where relevant, the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and any other relevant local or international privacy laws.
9.2 Consent mechanisms
SCOOT CAB will implement a robust mechanism for obtaining user consent for information collection and processing activities. This mechanism includes:
9.3 Data access and transparency
Users will have the right to access their personal information held by SCOOT CAB and to understand how it is being processed. Transparency measures include:
9.4 Data security measures:
To protect user privacy, SCOOT CAB will implement robust security measures, including:
9.5 SData breach measures
In the event of a data breach, SCOOT CAB will follow a predefined data breach response plan. This includes:
9.6 Privacy by Design
Privacy considerations will be integrated into the development and design of the SCOOT CAB app. This includes conducting Data Protection Impact Assessments (DPIAs) for new projects or significant changes to existing processes to assess and mitigate privacy risks and providing privacy training to employees involved in the development and maintenance of the app.
10.1 Vendor assessment
SCOOT CAB recognizes the critical importance of third-party security in maintaining the integrity and confidentiality of user information. All third-party vendors involved in the processing of personal information or providing services to the SCOOT CAB app will undergo a thorough security assessment.
10.2 Information sharing agreements
Clear and comprehensive information data sharing agreements will be established with third-party entities that involve the exchange of personal information. These agreements will include:
10.3 Geographic considerations
As SCOOT CAB operates exclusively in Canada, third-party vendors must comply with PIPEDA. Data storage, processing, and transmission must be conducted within Canada or in jurisdictions that are recognized as providing an equivalent level of privacy protection. We will use data centers in Canada.
10.4 Security audits
Regular security audits of third-party vendors will be conducted to assess their adherence to security and privacy standards. These audits will include security controls review, compliance checks, and incident response preparedness.
10.5 Incident response collaboration
In the event of a security incident involving a third party, the SCOOT CAB app will collaborate with the vendor to promptly identify, contain, and remediate the incident. Communication protocols will be established to coordinate incident response efforts and fulfill any legal reporting requirements.
10.6 Continuous monitoring
Continuous monitoring of third-party security practices will be maintained to ensure ongoing compliance and to swiftly address any changes in security postures. This includes staying informed about security updates, changes in ownership, and any other factors that may impact the security of shared information.
SCOOT CAB recognizes the pivotal role that employees play in maintaining the overall security posture. An ongoing security awareness program will be established to ensure that all employees, contractors, and relevant stakeholders are well-informed about information security practices and potential risks. Regular training modules will cover topics such as data protection, password security, social engineering, and the importance of compliance with this Policy. Tailored training content will be provided based on the specific roles and responsibilities of individuals within the organization.
12.1 Regular audits
To ensure ongoing compliance with regulatory requirements and the effectiveness of security controls, SCOOT CAB will conduct regular audits. These audits will include security control reviews, compliance checks, and vulnerability assessments.
12.2 Regulatory compliance
Given the primary operation in Canada, SCOOT CAB is committed to adhering to all relevant Canadian regulations, including PIPEDA. This includes ensuring that information is stored and processed within Canada or in jurisdictions recognized as providing an equivalent level of privacy protection, clarifying the legal jurisdiction under which SCOOT CAB operates, and addressing any legal matters in accordance with Canadian laws.
12.3 Privacy Impact Assessments (PIA)
When implementing new projects or significant changes to existing processes that may impact privacy, SCOOT CAB will conduct Privacy Impact Assessments (PIA). PIAs will be used to identify risks, mitigate risks, and maintain records of PIAs for reference and regulatory compliance.
12.4 External audits and certifications
SCOOT CAB may undergo external audits and seek relevant certifications to demonstrate its commitment to information security and privacy. This may include pursuing ISO/IEC 27001 certification for information security management systems and seeking certification or recognition from privacy and data protection authorities in Canada.
12.5 Documentation and record keeping
All audit findings, compliance assessments, and relevant documentation will be maintained for record-keeping purposes. This includes records of security controls, audit reports, and evidence of compliance with regulatory requirements.
12.6 Regulatory updates
SCOOT CAB will stay abreast of changes in Canadian regulations, ensuring that this Policy remains aligned with evolving legal requirements. Regular reviews will be conducted to assess the impact of regulatory updates on security practices.
This Policy will undergo regular reviews to ensure its continued relevance and effectiveness. The frequency of these reviews will be annual basis or based on triggered reviews. Once updates to this Policy are approved, notifications and training will be provided to employees, contractors, and stakeholders.
14.1 Consequences
The enforcement of this Policy is vital to maintaining a secure environment for the SCOOT CAB app. Violations of this Policy may result in disciplinary actions commensurate with the severity of the violation and the potential impact on information security. Disciplinary actions may include verbal or written warnings for minor violations, suspension in cases of repeated or more serious violations, and termination of employment for severe violations.
14.2 Monitoring
To enforce this Policy, SCOOT CAB will implement monitoring mechanisms to detect and prevent policy violations. This includes network monitoring, user activity logs, and incident response.
14.3 Reporting violations
Employees, contractors, and stakeholders are encouraged to report any suspected violations of this Policy promptly. Reporting channels will be clearly communicated, and individuals who report violations in good faith will be protected from retaliation.
14.4 Investigation procedures
Upon receiving reports of violations, SCOOT CAB will conduct thorough investigations to determine the validity of the reports. Investigations may involve forensic analysis, interviews, and documentation review.
14.5 Legal actions
In cases where violations result in legal consequences, SCOOT CAB reserves the right to pursue legal actions against individuals or entities responsible for the violations. Legal actions may include civil litigation or reporting criminal activities to law enforcement authorities.
14.6 Policy accessibility
This Policy will be readily accessible to all individuals covered by it. Regular communication and training sessions will reinforce this Policy's importance and ensure that all personnel are aware of its content and implications.