Kontaktieren Sie uns

Regionen
AmerikaEMEAChinaAPAC
Branchen
HotellerieGastronomieEinzelhandelEntertainment
Über uns
ÜbersichtKundenGeschäftsführungBotschaft des GründersShiji Office in Ihrer NäheJobsRessourcenKontaktieren Sie unsKunden Login →
Neuigkeiten
Einblicke →Pressemitteilungen GlobalNewsletterNeuigkeiten für Investoren
Kontakt
Sprache
EnglishESPAÑOLDEUTSCHFRANÇAISPolski中文日本語
Kontakt

Security policy and VDP

General Terms and Conditions – Shiji Group
General Terms and Conditions – Shiji Group
SITA - Allgemeine Geschäftsbedingungen
Security policy and VDP
ImpressumDatenschutzDatenschutzbeauftragter京 ICP 证 16059654 号 - 1Elektroschrott
Speisekarte

Security policy and VDP

______________________________________________________________________________________________________

(September 2023)

‍

Introduction

The main goal of Shiji is to deliver and maintain exceptional service to our customers. Our mission is to provide the hospitality, food service, retail and entertainment industry with a complete and modern technology stack that is secure, scalable, and ready for the future. Security is a foundational element underpinning the achievement of this goal. To ensure the highest security level of the software and information processed by Shiji, the company's Board of Directors decided to implement a Comprehensive Security Strategy and Information Security Management System, addressing the strategy.

The principles of the Information Security Management System, related to the Shiji products have been defined in accordance with the requirements of the standard ISO/IEC 27001:2017 “Information technology - Security techniques - Information Security Management Systems”. Moreover, Shiji Group implemented controls described in the ISE/IEC 27018 standard regarding personal data protection in cloud solutions.

The Information Security Policy covers all employees and contractors, and third parties having access to or processing sensitive information. The Information Security Policy contains rules ensuring Shiji products’ security in the following domains:

Information security policies

Shiji implemented a set of information security policies describing the security strategy, direction, and technical requirements. The policies were published and communicated to all employees. All security policies meet the requirements of the ISO/IEC 27001 standard.

Organization of information security

Shiji established a security management framework, assigned roles and responsibilities for information security. Shiji also implemented a risk management process, ensuring that risks are identified, assessed, and treated according to the risk appetite.

Human resource security

Shiji informs employees about the implemented security policies and their obligations and responsibilities related to information security. Periodically, employees must acknowledge those requirements. Employees are regularly trained to improve their security awareness.

Asset management

Shiji maintains inventories of information assets. All assets are assigned to the owners and classified to ensure they receive appropriate level of protection, based on the criticality of the assets. Customers’ data is among the most sensitive assets that require the highest level of protection.

Access control

Shiji manages access to assets on a need-to-know / least privilege basis. Access to any resource is granted only after required approvals and removed promptly upon termination of employment. Accounts are periodically reviewed.

Cryptography

Shiji applies effective cryptography based on current recommendations, technical requirements and conducted risk assessments.

Physical and environmental security

Shiji premises are protected with physical security measures to prevent unauthorized physical access. Shiji cooperates only with reputable cloud infrastructure vendors, providing the required level of physical security.

Operations security

Shiji implemented security operations to protect the services and data processed within the services. The operations are managed by the Security Team and the Security and Network Operations Center Team working on a 24/7 basis. The team implemented among others, a vulnerability management process, ensuring that vulnerabilities are addressed according to their classification.

Communications security

Shiji implemented network security solutions, to ensure the security and monitoring of networks. All information transmitted via public networks is encrypted.

System acquisition, development, and maintenance

Security is an integral part of the development and systems acquisition. Services are subject of continuous web application and infrastructure threat assessment, source code reviews, and penetration testing.

Supplier relationships

Shiji applied security controls related to suppliers depending on the scope of the cooperation, sensitivity of the exchanged data and risks being a result of the cooperation.

Information security incident management

Shiji implemented a security incident management process, supported by multiple technical solutions. The Security and Network Operations Center Team monitors the performance and security levels on a 24/7 basis. Detected security incidents are resolved timely.

Information security aspects of business continuity management

Shiji created and implemented business continuity plans to ensure the required availability of the service. The services are designed and implemented to address high availability requirements. Business continuity scenarios are tested at least once a year.

Compliance

Shiji identified applicable legislations and contractual requirements, to ensure the services and Shiji are compliant with them. Information security area is periodically reviewed, to ensure that it is implemented and operates in accordance with internal security regulations.

The Shiji Information Security Policy is a subject of continuous improvement, according to the requirements of ISO/IEC 27001 and all stakeholders' recommendations.

To secure a copy of our ISO certificate, we graciously request that you make a formal request via email to itsecurity@shijigroup.com, specifying the product of your interest. This service is available for both our esteemed existing clients and prospective partners, and upon receiving your request, we will promptly provide you with the necessary information.

‍

Shiji Group Vulnerability Disclosure Policy

Introduction

Shiji Group welcomes feedback from security researchers and systems’ users to help improve our security. If you believe you have discovered a vulnerability, privacy issue, exposed data, or other security issues in any of our assets, we want to hear from you. This policy outlines the steps for reporting vulnerabilities to us, what we expect, and what you can expect from us.

Systems in Scope

This policy applies to any digital assets owned, operated, or maintained by Shiji Group.

Out of Scope

Assets or other equipment not owned by Shiji Group. Vulnerabilities discovered or suspected in out- of-scope systems should be reported to the appropriate vendor or applicable authority.

Scope Limitations

This policy does not authorize you to:

  • Perform any actions that could negatively impact the availability, integrity, or confidentiality of our systems or our customers' data.
  • Perform any physical or social engineering attacks, including but not limited to phishing, smishing, or other similar attacks.
  • Perform any vulnerability testing on third-party applications or systems not owned or maintained by Shiji.
  • By submitting a vulnerability report, you acknowledge that you have read and understood this policy and agree to comply with its guidelines.

Our Commitments

When working with us, according to this policy, you can expect us to:

  • Respond to your report promptly, and work with you to understand and validate your report.
  • Strive to keep you informed about the progress of a vulnerability as it is processed.
  • Work to remediate discovered vulnerabilities in a timely manner, within our operational constraints.
  • Extend Safe Harbor for your vulnerability research that is related to this policy.

Our Expectations

In participating in our vulnerability disclosure program in good faith, we ask that you:

  • Play by the rules, including following this policy and any other relevant agreements. If there is any inconsistency between this policy and any other applicable terms, the terms of this policy will prevail.
  • Report any vulnerability you have discovered promptly.
  • Avoid violating the privacy of others, disrupting our systems, destroying data, and/or harming user experience.
  • Use only the email itsecurity@shijigroup.com to report vulnerability.
  • Provide us a reasonable amount of time (at least 90 days from the initial report) to resolve the issue before you disclose it publicly.
  • Perform testing only on in-scope systems, and respect systems and activities which are out- of-scope;
  • If a vulnerability provides unintended access to data; limit the amount of data, you access to the minimum required for effectively demonstrating a Proof of Concept. Cease testing and submit a report immediately if you encounter any user data during testing, such as Personally Identifiable Information (PII), Personal Healthcare Information (PHI), credit card data, or proprietary information.
  • Act in good faith: Engage in responsible vulnerability disclosure and refrain from any malicious activities that could harm our systems or our customers.
  • Comply with applicable laws: Ensure that your research and activities comply with the relevant local and international laws and regulations.

Official Channels

Report security issues to itsecurity@shijigroup.com, providing all relevant information. The more details you provide, the easier it will be for us to triage and fix the issue. Please include the following details:

  • Vulnerability name
  • Vulnerability description
  • Vulnerability score (CVSS3)
  • Product(s) affected
  • Your name
  • Your email
  • Technical details (endpoint, payload, other)

Safe Harbor

When conducting vulnerability research, according to this policy, we consider this research conducted under this policy to be:

  • Authorized concerning any applicable anti-hacking laws, and we will not initiate or support legal action against you for accidental, good-faith violations of this policy.
  • Authorized concerning any relevant anti-circumvention laws, and we will not bring a claim against you for circumvention of technology controls.
  • Exempt from restrictions in our General Terms and Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis.
  • Lawful, helpful to the overall security of the Internet, and conducted in good faith.

You are expected, as always, to comply with all applicable laws. If legal action is initiated by a third party against you and you have complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through our Official Channel before going any further.

Note that the Safe Harbor applies only to legal claims under the control of the organization participating in this policy, and that the policy does not bind independent third parties.

Disclosure Policy:

  • As a vulnerability report submitter, I will give the chosen Security Team reasonable time to investigate and mitigate an issue I report.
  • While the Security Team investigates, I refrain from discussing my discovery in any way with a third party (e.g., fellow researchers, colleagues, companies, governments).
  • Acting in good faith, I will try to avoid privacy violations and disruptions to others, including but not limited to destruction of data and interruption or degradation of any services.
  • I will not exploit a security issue I discover for any reason. This includes demonstrating additional risk, such as attempted compromise of sensitive company data or probing for additional issues.

‍

Zum Seitenanfang
Shiji-Logo

Die Shiji Group hat es sich zur Aufgabe gemacht, das globale Gastgewerbegeschäft zu vernetzen. Wir entwickeln voll integrierte technologische Lösungen, die der Hotel-, Einzelhandels-, Gastronomie- und Unterhaltungsbranche ermöglichen, bestmöglich mit ihren Gästen zu interagieren.

linkedin-logo shiji groupFacebook-Symbol Shiji GroupTwitter-Symbol Shiji Groupyoutube-schaltfläche shiji group
QR-transparent Shiji Group
Produkte
HotellerieGastronomieEinzelhandelEntertainmentShijiCRM
Über uns
ÜbersichtKundenGeschäftsführungBotschaft des GründersRessourcenKontaktKundenbetreuung
Neuigkeiten
InsightsPressemitteilungen GlobalPressemitteilungen ChinaNeuigkeiten für InvestorenShiji Japan
Nächste Shiji Niederlassungen finden lov mit unserem Globalen Niederlassungsverzeichnis
© 2022 Shiji Group. Alle Rechte vorbehalten. Die jeweiligen Marken werden von ihren jeweiligen Eigentümern vertreten.
CareersLegal NoticeDPOPrivacy PolicyE-wasteGeneral Terms and ConditionsSITA - Terms and conditions 京ICP证16059654号-1