Data Privacy and Information Security:
Verint understands the importance of handling information assets, respecting the rights of individuals, and compliance with data privacy laws. When we obtain personal data for our own business purposes, for instance through our marketing or business development activities or otherwise from business persons or entities with whom we do not have an agreement, our Global Privacy Notice explains how we collect such personal data, the purposes for which data is used, and our compliance procedures. For example:
- Where we collect personal data from such third-parties, we are clear this is with consent or another legal basis and we outline the purposes for which personal data will be used
- We do not knowingly process data about children
- We do not sell data we have acquired for marketing purposes
- We do not sell personal data
Verint’s policy and practice is to only use data in accordance with the primary purposes for which it was lawfully obtained. The Global Privacy Notice also explains how to contact us in the event of concerns or questions regarding privacy rights.
For our recruiting efforts, Verint provides job applicants with a privacy notice that describes how we collect, process, and store their personal data.
Verint takes steps to protect our data and third-party data we receive from our customers through the implementation of technological and organizational measures designed to reduce the risk from cybersecurity threats, including data theft or destruction. Our cybersecurity program also includes:
- The adoption of best practices frameworks for our cybersecurity program, including but not limited to SOC 2, PCI-DSS, ISO 27001, NIST CSF, and NIST 800-53
- Certifications or conformance for applicable products and services, including SOC 2, PCI-DSS, ISO 27001, and HIPAA
- The adoption of best practices frameworks by applicable partners, including SOC 2 and FedRAMP
- Experienced personnel with certifications that include Certified Information Systems Security Professional (CISSP), Certified Information Systems Management (CISM), and Certified Information Systems Auditor (CISA)
- Independent third-party verification of risk management standards for portions of our products and services, with planned expansion in the future