Legal and Compliance
Security Statement
Security Statement
At MP Technology, protecting the confidentiality, integrity, and availability of client data is a core responsibility. We employ a layered security approach designed to safeguard systems and information, prevent unauthorized access, and support compliance with applicable standards and regulations.
Our security program includes:
- Network Protections: Firewalls, segmentation, and intrusion prevention systems to protect against unauthorized access and malicious traffic.
- Access Controls: Role-based access, multifactor authentication, and least-privilege principles applied across managed systems and internal environments.
- Monitoring & Response: Continuous monitoring of managed platforms, centralized logging, and documented incident response procedures with escalation to affected customers as appropriate.
- Patch & Vulnerability Management: Regular updates, patch deployment, and vulnerability assessments to reduce exposure to known threats.
- Data Protection: Encryption of sensitive data in transit and, where applicable, at rest. Backups and recovery processes are implemented according to customer service level agreements.
- Employee Practices: Background screening, confidentiality obligations, and security awareness training for personnel with access to customer systems or data.
- Continuous Improvement: Ongoing evaluation of emerging threats and adoption of controls aligned with recognized frameworks such as NIST and CIS benchmarks.
While no system can be made completely immune to risk, MP Technology follows industry best practices to minimize threats and respond promptly when incidents occur. Security is a shared responsibility: customers are expected to maintain reasonable safeguards within their own environments, and MP Technology will provide guidance and support to help them meet their compliance and risk management objectives.