Security protocols for user access

  • Password policy: Strong, unique passwords must be used for all accounts. Passwords should be a mix of uppercase letters, lowercase letters, numbers, and symbols, with a minimum length of 12 characters.
  • Access review: User access levels are reviewed quarterly to ensure that permissions are still appropriate for each user’s role within the company.
  • Employee Departure Protocol: Upon an employee leaving the company, their user profile and access to the website will be promptly deleted to maintain security and data integrity.

Compliance with these rules ensures that our website remains secure and is managed efficiently by appropriately trained personnel. The Group Marketing team is responsible for monitoring compliance with these protocols and should be contacted in case of any access-related queries or concerns.

Was this article helpful?
YesNo
RELATED CONTENT

About Tulip

TULIP allows you to manage your back-office functions in the cloud, to achieve more simplicity, transparency and efficiency. It serves as a highly secure and traceable self-service portal that eliminates the burden of paper work, offline processes and the risks involved, over full data digitization and smart automation of workflows. During the past decade, TULIP has become a global platform, accommodating more than 2,800 companies, with over 115,000 users beyond 30 locations.
© TULIP Solutions, all rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram