Statement of Security Control

At [Your Company Name], we take the security of your personal information very seriously. We are committed to maintaining robust security measures to protect your data from unauthorized access, disclosure, alteration, and destruction. This Statement of Security Control outlines the practices and technologies we use to ensure the highest level of security for our website,

Data Encryption

  • SSL/TLS Encryption: We use Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols to encrypt data transmitted between your browser and our servers. This ensures that any information you send to us is protected during transmission.

Access Control

  • Restricted Access: Access to personal information is restricted to authorized personnel only. We implement role-based access controls to ensure that employees only have access to the information necessary for their job functions.
  • Multi-Factor Authentication: We use multi-factor authentication (MFA) for administrative access to our systems, adding an extra layer of security beyond just a username and password.

Data Storage and Protection

  • Secure Servers: We store your personal information on secure servers that are protected by firewalls and other advanced security technologies.
  • Regular Backups: We perform regular backups of our data to ensure that we can recover your information in the event of data loss or a security incident.

Monitoring and Testing

  • Continuous Monitoring: We continuously monitor our systems for suspicious activity and potential vulnerabilities. Any detected threats are promptly investigated and mitigated.
  • Security Testing: We regularly conduct security testing, including vulnerability assessments and penetration testing, to identify and address potential security weaknesses.

Incident Response

  • Incident Management: We have an incident response plan in place to promptly address any security breaches or incidents. This includes steps to contain the breach, assess the impact, and notify affected users if necessary.
  • Notification Procedures: In the event of a data breach, we will notify affected users as required by law and provide information on the steps we are taking to address the breach and protect your information.


  • Regulatory Compliance: We comply with applicable data protection laws and regulations to ensure that your personal information is handled securely and in accordance with legal requirements.
  • Privacy Policy: Our Privacy Policy outlines how we collect, use, and protect your personal information. We encourage you to review our Privacy Policy for more information.

User Responsibilities

  • Password Protection: We recommend that you use strong, unique passwords for your accounts and update them regularly. Do not share your passwords with others.
  • Suspicious Activity: If you notice any suspicious activity on your account or suspect that your personal information has been compromised, please contact us immediately at [your contact email or phone number].

Contact Us

If you have any questions about our security practices or this Statement of Security Control, please contact us at:

New Jersey Division of the International Association for Identification
PO Box 423, New Milford, NJ 07646