INFORMATION SECURITY POLICY
Gorilla Public
gorillapublic.com
|
Effective Date |
March 2, 2026 |
|
Version |
1.0 |
|
Review Cycle |
Annually or upon material change |
|
Contact |
privacy@gorillapublic.com |
1. Purpose
This Information Security Policy (“Policy”) establishes the principles, standards, and controls that Gorilla Public (“Company,” “we,” or “us”) employs to protect the confidentiality, integrity, and availability of information assets — including data collected through external services, social media and mobile app platform integrations and any applications developed under an external Partner Program. This Policy applies to all employees, contractors, and third-party service providers who access Company systems or data.
2. Scope
This Policy applies to:
3. Data Classification
All data handled by Gorilla Public is classified into the following tiers:
|
Classification |
Description |
Examples |
|
Confidential |
Highly sensitive; restricted access |
API keys, credentials, PII, payment data |
|
Internal |
Operational use only |
System logs, internal docs, client configs |
|
Public |
Approved for public release |
Marketing copy, published blog content |
4. Access Control
4.1 Principle of Least Privilege
Access to information systems and data is granted on a need-to-know basis. Users are provided the minimum level of access required to perform their job functions.
4.2 Authentication
4.3 Third-Party API Access
5. Data Handling and Privacy
5.1 User Data
Data obtained through the API or Partner Program integrations is subject to the following controls:
5.2 Applicable Privacy Laws
Gorilla Public complies with applicable privacy regulations including, but not limited to, the California Consumer Privacy Act (CCPA) and, where applicable, the General Data Protection Regulation (GDPR). Users may request access to, correction of, or deletion of their personal data by contacting privacy@gorillapublic.com.
6. Network and Infrastructure Security
7. Application Security
7.1 Secure Development Practices
7.2 Vulnerability Management
8. Incident Response
In the event of a suspected or confirmed security incident involving Company systems or Partner-related data:
To report a security incident or vulnerability, contact: security@gorillapublic.com
9. Employee and Contractor Responsibilities
10. Physical Security
As a remote-first business, Gorilla Public does not operate a traditional office data center. The following controls apply to all work environments:
11. Third-Party Vendor Management
Gorilla Public evaluates third-party vendors and service providers for their security posture before engaging them to process Confidential data. Vendors handling sensitive data are required to maintain security standards consistent with this Policy and, where applicable, to execute data processing agreements (DPAs).
12. Policy Review and Enforcement
This Policy is reviewed at least annually or following any significant change to Company operations, technology stack, or applicable regulations. Violations of this Policy may result in disciplinary action up to and including termination of employment or contract, and, where applicable, civil or criminal liability.
Policy Owner: Blake, Gorilla Public
Contact: privacy@gorillapublic.com
13. Acknowledgment
By accessing Gorilla Public systems or data, all personnel agree to comply with the terms of this Information Security Policy.