People and process
We restrict access to both physical and digital information.
Technology
Third parties
Tip: How to save time when creating a tab component from scratch. Create one tab that has the images, text format, animations, and interactions you want the other tabs in the module to have. Copy and paste the tab and change the names of the pasted tab folders in the layers panel. You can then change the text and images in each tab. This is more efficient than making each tab from scratch.
Create digestible content and save screen real-estate by condensing lengthy content into categories that can be viewed on separate tabs.
Template - Tab Components
1280px x 720px
To replace an image, select the png or jpeg on the canvas or in the layers panel and click the "Replace image" button, which is next to the image thumbnail in the design panel. Any applied animation to the original image will carry over to the new one. Tip: Try to make the new image a similar size and dimension to the image being replaced.
We maintain industry best practices for digital security, including:
We conduct thorough due diligence on third-party service providers.
Equities
Currencies
Use multifactor authentication wherever it’s an option.
Data encryption.
We follow best practices for password standards and controlling data access.
•
o
Access is limited to a “need to know” basis.
Everyone in our organization must complete annual privacy and data security training, which includes:
Our privacy obligations.
We ensure strong data security provisions.
We have processes for ongoing oversight to ensure service providers continue to meet our standards.
Regularly back up important data to a secure location.
Create passwords that are strong and long.
Cyber threats that could impact our organization and data.
Our data security team is alerted to any unusual activity or behaviour and responds swiftly.
We have adopted the National Institute of Standards and Technology cybersecurity framework, which is widely considered to be the global best-practice standard. You can read more about the framework here.
Data loss prevention.
US Treasury yields
Active data governance.
Topic 01 Title
Commodo cubilia, donec inventore, at beatae ides. Mollis blandit aliquip leo auctor, nec, provident vehicula vulputate nostra, optio, sem quisque consequatur porro! Facilis, saepe cupidatat sunt proident sapien voluptatum voluptates ante mattis, eu. Aliquid tempus voluptas, minima ullam sit.
Topic 01
Topic 02
Topic 03
Topic 04
Topic 02 Title
Topic 03 Title
Topic 04 Title