{"id":12376,"date":"2025-02-18T08:01:57","date_gmt":"2025-02-18T16:01:57","guid":{"rendered":"https:\/\/www.aiasurety.com\/bail\/?page_id=12376"},"modified":"2026-01-26T15:40:13","modified_gmt":"2026-01-26T23:40:13","slug":"security-commitment","status":"publish","type":"page","link":"https:\/\/www.aiasurety.com\/bail\/privacy-policy\/security-commitment\/","title":{"rendered":"Security Commitment"},"content":{"rendered":"<h1><span style=\"font-size: 20pt;\"><strong>Information Security Policy<\/strong><\/span><\/h1>\n<p><strong>Last Revised 2\/18\/25<br \/>\n<\/strong><\/p>\n<h2><span style=\"font-size: 12pt;\"><strong>Information Security Policy for Web and EULAs<\/strong><\/span><\/h2>\n<p>The following Information Security Policy is provided by AIA Holdings, Inc. and its affiliates, (collectively, \u201cwe\u201d, \u201cus\u201d, \u201cour\u201d).<\/p>\n<p><strong>Cybersecurity Practices<\/strong><\/p>\n<p>As technology becomes more complex and sophisticated, so do the cyber risks that businesses and organizations face. We have implemented technologies and tools to implement cybersecurity protections and maintain a cyber risk management strategy related to information security that includes monitoring emerging security threats and assessing appropriate responsive measures.<\/p>\n<p><strong>Policy &amp; Governance<\/strong><\/p>\n<p>We and our affiliates maintain a comprehensive set of information security policies and standards, which are modeled to align with the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF). Our information security policies and standards have been developed in collaboration with groups across the enterprise, such as Legal, Compliance, HR and each of our business segments. Our policies include, for example, Information and System Use policies for employee and non-employee system users.<\/p>\n<p>We perform an annual information security assessment as part of our Information Security Management Program (ISMP).<\/p>\n<p><strong>Technology<\/strong><\/p>\n<p>We use various technologies and tools, as appropriate, to enhance information security, such as multifactor authentication, encryption, firewalls, intrusion detection and prevention, vulnerability scanning, and patch management.<\/p>\n<p>In addition, our CISO (Chief Information Security Officer) team is actively engaged within the information security community in order to monitor emerging trends and developments and acquire intelligence for identifying and mitigating cyber threats.\u00a0 Additionally, our Cybersecurity team investigates suspicious events.<\/p>\n<p>As the workforce, the work environment and the threat landscape continue to evolve, we continue to evaluate related risks and implement appropriate controls.<br \/>\n<strong><br \/>\nTraining &amp; Awareness<\/strong><\/p>\n<p>To help manage risks from potential cybersecurity threats, as part of our annual cybersecurity training, all employees receive data protection and privacy training, which focuses on the need to appropriately protect and secure confidential company information. We also provide regular targeted training on topics such as phishing and secure application development, among others. In addition to online training, employees are provided with cybersecurity related information through a number of different methods, including event-triggered awareness campaigns, recognition programs, security presentations, intranet articles, videos, system-generated communications, email publications and various simulation exercises.<\/p>\n<p><strong>Third-Party Relationships<\/strong><\/p>\n<p>As part of our supplier risk management program, using a risk-based approach, the information security team works with our vendor management team to conduct assessments with respect to our third-party service providers based upon the risk of each third-party.<\/p>\n<p>Where appropriate, we seek to incorporate contractual language with third party service providers that includes clear terms involving the collection, use, sharing and retention of user data, as well as compliance with appropriate security terms.<\/p>\n<p><strong>Incident Response<\/strong><\/p>\n<p>We have a Security Incident Response Plan in place. The Incident Response team, under the direction of the CISO, executes on the IR plan with the goal of ensuring timely and accurate resolution of information security incidents.<\/p>\n<p><strong>Additional Information <\/strong>Additional information regarding privacy and security, including our Privacy Statements, is available on\u00a0our website.<\/p>\n<p><strong>Contact Information<\/strong><\/p>\n<p>If you have any questions, you may contact us via:<\/p>\n<p>Phone: (800) 500-3727<br \/>\nEmail: info@alleghenycasualty.com<\/p>\n<p>Postal Address:<br \/>\nAIA Holdings, Inc.<br \/>\nAttn: Compliance Department<br \/>\nPO Box 5600, Thousand Oaks, CA 91359<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security Policy Last Revised 2\/18\/25 Information Security Policy for Web and EULAs The following Information Security Policy is provided by AIA Holdings, Inc. and its affiliates, (collectively, \u201cwe\u201d, \u201cus\u201d, \u201cour\u201d). Cybersecurity Practices As technology becomes more complex and sophisticated, so do the cyber risks&hellip;  <\/p>\n<div class=\"read-more-button\"><a class=\"button\" href=\"https:\/\/www.aiasurety.com\/bail\/privacy-policy\/security-commitment\/\" title=\"Read Security Commitment\">Read more<\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"parent":11263,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aiasurety.com\/bail\/privacy-policy\/security-commitment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Commitment - AIA Bail Bond Surety\" \/>\n<meta property=\"og:description\" content=\"Information Security Policy Last Revised 2\/18\/25 Information Security Policy for Web and EULAs The following Information Security Policy is provided by AIA Holdings, Inc. and its affiliates, (collectively, \u201cwe\u201d, \u201cus\u201d, \u201cour\u201d). Cybersecurity Practices As technology becomes more complex and sophisticated, so do the cyber risks&hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aiasurety.com\/bail\/privacy-policy\/security-commitment\/\" \/>\n<meta property=\"og:site_name\" content=\"AIA Bail Bond Surety\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/aiasurety\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-26T23:40:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@bailinsights\" \/>\n<meta name=\"twitter:site\" content=\"@bailinsights\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aiasurety.com\/bail\/#organization\",\"name\":\"AIA Bail Bond Surety\",\"url\":\"https:\/\/www.aiasurety.com\/bail\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/aiasurety\",\"https:\/\/www.linkedin.com\/company\/aia-surety\/\",\"https:\/\/www.youtube.com\/channel\/UCVbx8TaZ7bfKt3l3xw1fSpg\",\"https:\/\/twitter.com\/bailinsights\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.aiasurety.com\/bail\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.aiasurety.com\/bail\/wp-content\/uploads\/2019\/11\/aiasurety-logo-color.png\",\"width\":300,\"height\":73,\"caption\":\"AIA Bail Bond Surety\"},\"image\":{\"@id\":\"https:\/\/www.aiasurety.com\/bail\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aiasurety.com\/bail\/#website\",\"url\":\"https:\/\/www.aiasurety.com\/bail\/\",\"name\":\"AIA Bail Bond Surety\",\"description\":\"Bail Bond Insurance Company, Largest and Oldest Bail Bond Surety\",\"publisher\":{\"@id\":\"https:\/\/www.aiasurety.com\/bail\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.aiasurety.com\/bail\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aiasurety.com\/bail\/privacy-policy\/security-commitment\/#webpage\",\"url\":\"https:\/\/www.aiasurety.com\/bail\/privacy-policy\/security-commitment\/\",\"name\":\"Security Commitment - AIA Bail Bond Surety\",\"isPartOf\":{\"@id\":\"https:\/\/www.aiasurety.com\/bail\/#website\"},\"datePublished\":\"2025-02-18T16:01:57+00:00\",\"dateModified\":\"2026-01-26T23:40:13+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aiasurety.com\/bail\/privacy-policy\/security-commitment\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.aiasurety.com\/bail\/wp-json\/wp\/v2\/pages\/12376"}],"collection":[{"href":"https:\/\/www.aiasurety.com\/bail\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.aiasurety.com\/bail\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.aiasurety.com\/bail\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aiasurety.com\/bail\/wp-json\/wp\/v2\/comments?post=12376"}],"version-history":[{"count":4,"href":"https:\/\/www.aiasurety.com\/bail\/wp-json\/wp\/v2\/pages\/12376\/revisions"}],"predecessor-version":[{"id":12700,"href":"https:\/\/www.aiasurety.com\/bail\/wp-json\/wp\/v2\/pages\/12376\/revisions\/12700"}],"up":[{"embeddable":true,"href":"https:\/\/www.aiasurety.com\/bail\/wp-json\/wp\/v2\/pages\/11263"}],"wp:attachment":[{"href":"https:\/\/www.aiasurety.com\/bail\/wp-json\/wp\/v2\/media?parent=12376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}