LOG IN
Digital signageVideo (EasyMovie)
AUDIENCES
Shoppers
Employees
Flow
Market
resourcesCASTINGABOUTCONTACT
Centre d'aideSupportLegalCybersecuritySite map
LOG IN
Digital signageVideo (EasyMovie)
CONTACT
Latest articles
Qu'est-ce que le Retail Media et pourquoi est-il stratégique ?
Accélérateur de prise de décision dans le parcours d'achat du consommateur, le retail media connaît une forte croissance. Découvrez son fonctionnement et ses enjeux.
Read the article
Point of sale
Qu’est-ce que le flex office ? Définition, fonctionnement et bonnes pratiques
Le flex office transforme l'organisation du travail. Découvrez ses avantages, inconvénients et les meilleures pratiques pour l'adopter en entreprise.
Read the article
Internal communication
Structurer sa communication interne : les 9 étapes essentielles
Découvrez une méthode en 9 étapes pour structurer votre communication interne, renforcer l’engagement et impliquer durablement vos collaborateurs.
Read the article
Communication
Digital out of home - publicité commerciales
Les avantages d’une régie publicitaire DOOH pour maximiser les performances des campagnes
Découvrez comment une régie publicitaire spécialisée DOOH optimise l'affichage dynamique pour maximiser la visibilité et renforcer le rayonnement d’une marque.
Read the article
Digital Signage
Monetize and monetize in-store screens
Digital signage screens are communication spaces with high monetization potential. Find out how to monetize your screens.
Read the article
Digital Signage
Point of sale
L’évolution des moyens de communication à l’ère du digital
L’évolution des moyens de communication s’accélère avec le digital. Découvrez les tendances clés et leurs impacts sur les entreprises.
Read the article
Digital Signage
Comment choisir le moyen de communication adapté à votre entreprise ?
Découvrez comment choisir le bon moyen de communication en entreprise : interne, externe, digital ou traditionnel, et optimisez votre stratégie.
Read the article
Internal communication
Montage vidéo : conseils et outils de création
Découvrez les meilleurs conseils et outils pour le montage vidéo afin de créer des contenus captivants et professionnels facilement.
Read the article
Video
Video tutorials
Comment faire un plan de communication ? 10 étapes
Voici les 10 étapes à suivre pour construire un plan de communication efficace et rapidement actionnable par votre entreprise.
Read the article
Communication
Zero-click content : qu'est ce que c'est, et pourquoi en créer ?
Découvrez comment créer du contenu "zero click" efficace pour attirer et engager votre audience sans qu'ils aient besoin de cliquer pour plus d'informations.
Read the article
Video
See all articles
CONTACT
MENU
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

This policy outlines Cenareo's approach to managing data security and cybersecurity risks, protecting our assets, and ensuring the confidentiality, integrity, and availability of customer's data throughout its lifecycle.

‍

Risk Assessment

Cenareo conducts periodic risk assessments to identify potential threats, vulnerabilities, and their impact on data security and cybersecurity.

These assessments consider various factors, including:

  • Data classification
  • System and application security postures
  • Network infrastructure vulnerabilities
  • Internal and external threats (e.g., cyberattacks, human error)

The results of the risk assessments inform our security strategy, resource allocation, and implementation of appropriate controls.

‍

Data Classification

Cenareo categorizes data based on its sensitivity and potential impact in case of a breach.

This helps prioritize security measures and allocate resources effectively, as well as warranty:

  • Improved Security: By identifying the most critical assets and prioritizing security controls for their protection.
  • Compliance: By aligning with data privacy regulations that often mandate specific safeguards for certain types of data (e.g., GDPR).
  • Efficient Resource Allocation: By understanding data sensitivity, organizations can allocate security resources more effectively and avoid over-protecting low-risk data.
  • Incident Response: By simplifying incident response, providing a clear understanding of the potential impact of a data breach.

‍

Data classification is an ongoing process, Cenareo regularly reviews and updates classification schemes to reflect changes in business, regulations, and the threat landscape.

Cenareo Data is categorized with the following definitions:

‍

Highly Confidential Data

This category includes data that is critical to the Cenareo operations, financial well-being, or reputation. A breach could result in severe financial losses, legal repercussions, or damage to public trust.Examples:

  • Customer financial information (credit card numbers, Social Security numbers)
  • Proprietary trade secrets or intellectual property
  • Personally identifiable information (PII) subject to strict regulations
  • Executive communications and strategic plans

‍

Confidential Data

This category encompasses sensitive data that, if compromised, could cause moderate financial harm, reputational damage, or operational disruptions.Examples:

  • Customer names, contact information, and purchase history
  • Internal employee data (salary information, performance reviews)
  • Confidential business documents (contracts, proposals)
  • Marketing campaign data

‍

Internal Data

This category includes sensitive information that is important for internal operations but doesn't necessarily have the same level of criticality as confidential data.Examples:

  • Employee training materials
  • Internal communications and memos
  • Non-public customer service records
  • IT infrastructure information

‍

Public Data

  • Definition: This category refers to information that is publicly available or intended for public dissemination.
  • Examples:some text
    • Company website content
    • Press releases and marketing materials
    • Public financial reports
    • Product manuals and brochures

‍

Asset Management

Cenareo maintains a comprehensive inventory of all assets that store, process, or transmit customer data. This includes:

  • Hardware (servers, workstations, mobile devices)
  • Software applications
  • Network devices
  • Data storage systems

Access to these assets is strictly controlled based on the principle of least privilege.

‍

Supply Chain & Subcontracting

Cenareo recognizes the importance of cybersecurity within our supply chain and has established a risk management strategy agreed upon by relevant stakeholders.This strategy includes conducting cyber supply chain risk assessments for:

  • Information system vendors
  • Third-party partners providing components or services
  • Subcontractors entrusted with customer's data

These assessments evaluate the security practices and potential risks associated with these entities.

‍

Third-Party Management

Cenareo conducts routine assessments of critical suppliers and third-party partners through:

  • Security audits
  • Penetration testing results
  • Other forms of security risk evaluations

This ensures they meet their cybersecurity requirements and adequately protect customer's data.Cenareo requires third parties to remediate identified vulnerabilities and security risks within a defined timeframe.

‍

Contractual Safeguards

Cenareo only shares data with third-party vendors when absolutely necessary for operational purposes. All such data sharing is governed by strict information security clauses within the contracts. These clauses address:

  • Confidentiality obligations regarding customer's data
  • Data integrity and availability requirements
  • Security controls and incident reporting procedures

‍

Non-Production Environments

Cenareo strictly minimizes the storage of customer data in non-production environments. This emphasizes the preference to avoid storing customer data in development, testing, and user acceptance testing (UAT) environments whenever possible. When necessary, customer data must be stored in non-production environments, and the same or equivalent security measures used in production environments are applied.

Need to reach us?

Contact our teams if you have any questions on this subject.

Contact us
Cenareo

Gestion des risques liés aux données et à la cybersécurité

Text Link
Engage your audiences,
become media.
Audiences
ShoppersEmployeesFlowMarket
SOLUTIONS
Solution Affichage dynamiqueSolution Vidéo
Company
CastingAboutContact us
Resources
BlogInsightsCase studiesVideos
CENAREO 2024, All rights reserved.
Centre d'aideSupportLégalRGPDCybersécuritéPlan du site
Cenareo - digital signage, solution video