Amazon Data Protection Policy
Data Protection Policy
This policy is written to ensure that Reference Point Computers Ltd are compliant for the Amazon policies below and governs the collection, processing, storage, usage and disposal of Amazon data obtained for the use of clients from the Amazon Marketplace Web Service APIs:
Acceptable Use Policy (effective January 1, 2021)
Data Protection Policy (effective January 1, 2021)
General Security Requirements
Consistent with industry-leading security standards and other requirements speciﬁed by Amazon based on the classiﬁcation and sensitivity of Amazon Information, Reference Point Computers Ltd maintains physical, administrative, and technical safeguards, and other security measures to maintain the security and conﬁdentiality of Amazon Information accessed, collected, used, stored, or transmitted by Reference Point Computers Ltd, and to protect that information from known or reasonably anticipated threats or hazards to its security and integrity, accidental loss, alteration, disclosure, and all other unlawful forms of processing. Without limitation, Reference Point Computers Ltd complies with the following requirements:
All Reference Point Computers Ltd servers implement network protection controls including network ﬁrewalls. Public access is not available and access is only allowed to specific systems based on IP address.
Access to Amazon information is strictly limited to users who require access in order to perform speciﬁc required tasks, and access is limited where possible to only required data. All users are unique with no shared logins. Access is logged and monitored.
Access can be revoked at any time if required and access is reviewed regularly (monthly). Upon leaving the company Access and User Permissions are immediately revoked.
No Amazon data is allowed to be stored on removable or personal devices. No PII is ever downloaded to devices.
Systems maintain and enforce "account lockout" by detecting suspicious activity such as multiple failed logins or large number of requests. Account permissions are revoked immediately and investigated by IT and System Administrators.
Encryption in Transit
All data in transit is encrypted using HTTPS on Reference Point Computers Ltd systems. There are no instances of data in transit not being encrypted, even unused.
Incident Response Plan
Reference Point Computers Ltd maintains an incident response plan to deal with security incidents, interruption to or degradation of services or systems.
Impact and urgency of incidents are assessed according to set criteria and appropriate staff are informed. The incident could be a support ticket that is resolved or escalated to the Technical Director. If the incident is deemed to be High Priority or Importance the Managing Director is informed and an incident response team is formed.
Roles and responsibilities will be defined within the incident response team according to the exact requirements of the nature of the incident. All documentation relating to the incident is stored in the form of support logs and meeting minutes to be made available later if requested by Amazon
In the case of a data breach of sensitive or PII, including Amazon data company Directors will be notified and the incident response team will be convened to triage, identify mitigations and remediation and to develop a communication plan to notify stakeholders. In the case of any Amazon data breach this includes emailing firstname.lastname@example.org within 24 hours of discovery. No regulatory authority, nor any customers will be notified, on behalf of Amazon unless Amazon specifically requests in writing that Reference Point COmputers do so. These incident response plans are reviewed every 4 months, or in the case of major platform changes, sooner.
Request for Deletion or Return
Within 24 hours of Amazon's request, Reference Point Computers Ltd will permanently and securely delete (in accordance with NIST 800-88 industry-standard sanitization processes) or return Amazon Information in accordance with Amazon's notice requiring deletion and/or return. Reference Point Computers Ltd will also permanently and securely delete all live (online or network accessible) instances of Amazon Information within 30 days after Amazon's notice. If requested by Amazon, Reference Point Computers Ltd will certify in writing that all Amazon Information has been securely destroyed.
Additional Security Requirements Speciﬁc to Personally Identiﬁable Information
The following additional Security Requirements are met for all Personally Identifiable Information ("PII"), including instances where PII is combined with non PII:
Data Retention and Recovery
Amazon PII is stored by Reference Point Computers Ltd on privately hosted servers for the sole purpose of facilitating the management of client orders. Amazon PII is removed from Reference Point Computers Ltd's databases no more than 30 days after the fulfillment of an order. Cancelled orders may have PII removed earlier. There is no Amazon PII stored in logs or other files.
Encryption and Storage
All PII is encrypted at rest using industry standard AES-256 encryption. No PII is allowed to be stored in external media or unsecured Cloud applications. All cryptographic materials (encryption/decryption keys) and cryptographic capabilities used for encryption of PII at rest are only accessible to the Reference Point Computers Ltd system processes and services on our privately hosted cloud servers. Reference Point Computers Ltd have a procedure for securely disposing of printed documents with the 3rd party “Shred-it”, though this is explicitly prohibited by Reference Point Computers Ltd policy.
Least Privilege Principle
Access is provided to developers and other employees on a need-to-know basis using access controls to assign specific roles to minimise access based on the need to perform duties.
Logging and Monitoring
Admin panel logging including access logs and authorization attempts are logged and stored for 12 months. No PII is ever logged anywhere on Reference Point Computers Ltd Systems. Code changes are logged to specific users. API logs are stored in databases on our privately hosted cloud servers, again not containing PII. Unauthorized access or unexpected request rates are flagged and suspicious activity is monitored by system administrators who will instigate an investigation as detailed in the Reference Point Computers Ltd Incident Response Plan.
Reference Point Computers Ltd will provide Amazon with all records if requested that demonstrate compliance with the Acceptable Use Policy, Data Protection Policy, and Amazon Marketplace Developer Agreement during the period of our agreement with Amazon and for 12 months thereafter. Reference Point Computers Ltd will also cooperate fully with any auditor assigned by Amazon and allow them to inspect the books, records, facilities, operations, and security of all systems that are involved with Reference Point Computers Ltd's application in the retrieval, storage, or processing of Amazon Information. Any breaches, failures or deﬁciencies ﬂagged as part of any audit will be rectiﬁed by Reference Point Computers Ltd at our expense within the agreed timeframe.