Security Commitment Policy

Effective Date: 01/01/2025
Last Updated: 7/15/2025

At Safari Micro, Inc., we recognize that information security is a critical component of trust in today’s digital business environment. As a leading IT solutions provider serving enterprise, casino/gaming, hospitality, education, and government clients nationwide, we are fully committed to safeguarding the confidentiality, integrity, and availability of the data and systems we manage, deliver, and support.

1. Our Security Commitment
Safari Micro, Inc. is committed to:
  • Maintaining a secure environment for all client data, systems, and engagements
  • Following industry best practices and compliance standards
  • Ensuring all employees and partners are educated and accountable for information security
  • Continually evaluating and improving our security posture in alignment with evolving threats

2. Key Areas of Security Practice
a. Data Protection and Privacy
We follow strict internal controls to protect customer data, including role-based access controls, encryption, and secure data storage practices. We comply with applicable data privacy regulations, including CCPA and CPRA for California residents.
b. Access Management
Access to systems and data is limited to authorized personnel on a need-to-know basis. Multifactor authentication (MFA), password complexity policies, and account auditing are standard practices.
c. Vendor and Partner Management
We evaluate and work only with technology vendors and service partners that meet stringent security and compliance requirements. Vendor risk is assessed as part of every project and procurement process.
d. Secure Configuration and Patching
All internal systems are deployed with secure configurations and are updated regularly to mitigate known vulnerabilities.
e. Network Security
We employ enterprise-grade firewalls, intrusion detection/prevention systems, endpoint protection, and encrypted communications across all company infrastructure and projects.
f. Employee Training and Awareness
All Safari Micro employees undergo annual cybersecurity training and are required to follow internal IT security policies. Simulated phishing and social engineering tests are conducted to ensure continuous awareness.
g. Incident Response and Breach Notification
We maintain an internal incident response plan to identify, contain, and resolve any suspected security events. Clients will be notified promptly in accordance with applicable laws and contractual obligations in the event of any breach involving their data.
h. Business Continuity and Disaster Recovery
Safari Micro maintains documented and tested disaster recovery (DR) and business continuity plans to minimize downtime and data loss during unforeseen events.

3. Client-Focused Safeguards
Safari Micro provides clients with:
  • Secure onboarding and access control for managed services
  • Optional security assessments and vulnerability scans as part of our professional services

4. Governance and Continuous Improvement
Our security program is overseen by executive leadership, regularly reviewed, and continuously improved based on new threats, client needs, and industry changes. We leverage frameworks such as NIST, CIS Controls, and ISO 27001 as guides in strengthening our policies and controls.

5. Contact
If you have any questions about our security practices or require specific documentation for vendor compliance, please contact:
Safari Micro, Inc.
Phone: 1-888-446-4770
Address: 2185 W Pecos RD STE 9 Chandler AZ 85224