Security
Gravyty is committed to following stringent security policies and procedures to protect the assets, data and information of Gravyty, Gravyty’s clients and Gravyty platform users.
We present our current policies and procedures below.
Downloadable policies (PDF)
Acceptable Use Policy
We maintain a comprehensive Acceptable Use Policy which is communicated to all our employees and contractors and enforced accordingly.
Data Security Policy
We use the industry standard encryption technologies to protect data across our systems.
Incident Management Policy
In the unlikely event of a security incident, our incident response procedures ensure that weaknesses are identified, reported and swiftly mitigated.
HECVAT
Our completed HECVAT 3.03 confirms that information, data, and cybersecurity policies are in place to protect your sensitive institutional information and constituents’ PII.
Gravyty Data Points
Our information security practices incorporate industry recognized best practices for protecting data and preventing security breaches, including limiting the scope of data our systems access and record.