We know security is a concern to you, and our approach will help give you a greater peace of mind. A security policy is what it means to be secure for a system, organization or other entity. For an organization like ours, it addresses the constraints on behavior of its regular ethical visitors, as well as constraints imposed on adversaries like hackers and Internet thieves. For systems, our security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people.
Because Cushion Source®'s security policy is a high level definition of secure consistent behavior, it is meaningless to claim an entity is "secure" without knowing what "secure" means. The bottom line is simple - what is shared with our company, stays in our company through multiple secure levels.
The willful introduction of computer viruses or disruptive/destructive programs into Cushion Source®'s environment is prohibited, and violators may be subject to prosecution. All desktop systems that connect to Cushion Source® network must be protected with an approved, licensed anti-virus software product that it is kept updated according to the vendor's recommendations. All servers and workstations that connect to the network and that are vulnerable to virus or worm attack must be protected with an approved, licensed anti-virus software product that it is kept updated according to the vendor's recommendations. Headers of all incoming data including electronic mail must be scanned for viruses by the email server where such products exist and are financially feasible to implement. Outgoing electronic mail should be scanned where such capabilities exist. Where feasible, system or network administrators should inform users when a virus has been detected. Virus scanning logs must be maintained whenever email is centrally scanned for viruses.
Intruder detection must be implemented on all servers and workstations containing data classified as high risk. Operating system and application software logging processes must be enabled on all host and server systems. Where possible, alarm and alert functions, as well as logging and monitoring systems must be enabled. Server, firewall, and critical system logs should be reviewed frequently. Where possible, automated review should be enabled and alerts should be transmitted to the administrator when a serious security intrusion is detected. Intrusion tools should be installed where appropriate and checked on a regular basis.
All connections to the Internet must go through a properly secured connection point to ensure Cushion Source®'s network is protected when the data is classified high risk. All connections to the Internet should go through a properly secured connection point to ensure the network is protected when the data is classified confidential.
All systems connected to the Internet should have a supported version of the operating system installed. All systems connected to the Internet must be current with security patches. System integrity checks of host and server systems housing high risk Cushion Source® data should be performed.
Cushion Source® must have a policy on appropriate and acceptable use that includes these requirements: Cushion Source® computer resources must be used in a manner that complies with OCG, Inc. policies and State and Federal laws and regulations. It is against Cushion Source® policy to install or run software requiring a license on any Cushion Source® computer without a valid license. Use of the Cushion Source®'s computing and networking infrastructure by Cushion Source® employees unrelated to their positions must be limited in both time and resources and must not interfere in any way with Cushion Source® functions or the employee's duties. Use of Cushion Source® resources for personal profit is not permitted except as addressed under other OCG, Inc. policies. Decryption of external or internal passwords is not permitted, except by authorized staff performing security reviews or investigations. Use of network sniffers shall be restricted to system administrators who must use such tools to solve network problems. Auditors or security officers in the performance of their duties may also use them. They must not be used to monitor or track any individual's network activity except under special authorization as defined by campus policy that protects the privacy of information in electronic form.
Information we collect and how we use it: We offer a number of services that do not require you to register for an account or provide any personal information to us, such as Cushion Source® articles and information on the products and services we sell. In order to provide our full range of services, we may collect the following types of information:
Residents of California can read our updated privacy notice here according to California Consumer Privacy Act ("CCPA")
Cushion Source® processes personal information on our servers in the United States of America.
When you sign up as a registered user on Cushion Source® that requires registration, we ask you to provide personal information. If we use this information in a manner different than the purpose for which it was collected, then we will ask for your consent prior to such use.
Most browsers are initially set up to accept cookies, but you can reset your browser to refuse all cookies or to indicate when a cookie is being sent. However, some Cushion Source® features, products, and services may not function properly if your cookies are disabled. You can decline to submit personal information to any of our services, in which case Cushion Source® may not be able to provide those services to you.
Cushion Source® only shares personal information with other companies or individuals outside of Cushion Source® in the following limited circumstances:
Please contact us at the address below for any additional questions about the management or use of personal data.
We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.
We restrict access to personal information to Cushion Source® employees, suppliers, manufacturers, and agents who need to know that information in order to fulfill your order or to develop or improve our services. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.
Accessing and updating personal information When you use Cushion Source® website, we make good faith efforts to provide you with access to your personal information and either to correct this data if it is inaccurate or to delete such data at your request if it is not otherwise required to be retained by law or for legitimate business purposes. We ask our online customers to identify themselves and the information requested to be accessed, corrected or removed before processing orders.
When we receive formal written complaints at this address, it is Cushion Source®’s policy to contact the complaining user regarding his or her concerns. We will cooperate with the appropriate regulatory authorities, including local data protection authorities, to resolve any complaints regarding the transfer of personal data that cannot be resolved between Cushion Source® and an individual.