Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Security Policy

Updated: June 20, 2023

Mersive and Customer agree that this Security Policy is hereby incorporated into and made a part of their written agreement that references this policy (the “Agreement”). Capitalized terms not specifically defined in this Security Policy will have the same meaning as in the Agreement. To the extent there is a conflict between the Agreement and the terms of this Security Policy, the terms of the Agreement will prevail unless otherwise expressly set forth therein.

Mersive maintains an information security program and a privacy information management program that contain technical, physical, and organizational measures designed to protect data of any type that is uploaded by or on behalf of Customer to the Service for the purpose of storage and retrieval (“Customer Data”). This Security Policy describes safety measures that Mersive has in place to protect the security of Customer Data. Mersive may review and update this Security Policy from time to time, provided that such updates shall be designed to enhance and not materially diminish the overall level of protection for Customer Data.

1. Information Security Policies and Procedures.

Mersive’s information security program includes policies and procedures designed to: (i) maintain the confidentiality, integrity, and availability of Customer Data in Mersive’s possession or control; (ii) protect such Customer Data against unauthorized access, use, disclosure, alteration, or destruction; and (iii) identify and mitigate potential threats or hazards to the security of Customer Data.

2. Third Party Management Policy.

The security of information assets and information processing facilities will not be reduced by an introduction of third-party products or services. Mersive will align the security of information assets and information processing facilities accessed or managed by third party business partners with security standards no less protective than Mersive’s information security program.

3. Physical Security.

Mersive utilizes infrastructure-as-a-service cloud providers as further described in the Agreement and/or Documentation (each, a “Cloud Provider”) and utilizes such Cloud Provider’s data center infrastructure to provide the Service to Customer. To ensure the Cloud Provider has appropriate physical and environmental controls for its data centers hosting the Service, Mersive regularly reviews those controls as audited under the Cloud Provider’s third-party audits and certifications.

4. Technical Security.

Mersive maintains technical security controls designed to: (i) restrict access to its information systems, including firewalls, intrusion detection and prevention systems, access control lists, and routing protocols; (ii) safeguard data on Mersive laptops or other mobile devices; and (iii) encrypt and protect Customer Data from unauthorized access during electronic transmission, transport, or storage by Mersive. Mersive conducts regular penetration testing or other appropriate security testing and security audits.

5. Technical Security.

Mersive maintains policies, procedures, and technical controls to limit access to Customer Data to authorized persons, and to remove access rights promptly in the event of a change in job status. Mersive requires all personnel to comply with its information security program. Mersive maintains a security awareness program to train personnel about their security obligations.

6. Business Continuity and Disaster Recovery.

Mersive maintains, implements, and invokes when needed, disaster recovery and business continuity plans to mitigate the effects of natural disasters, emergencies, acts of God, or similar events on Mersive’s information systems and the sites that house them (“BCDR Plan”). The BCDR Plan incorporates Mersive’s contingency plans, recovery plans (including recovery point objective and recovery time objective) and risk controls designed to enable Mersive’s continued performance under the Agreement consistent with any applicable recovery time objective specified therein. Mersive regularly reviews and updates these plans.