Novelis is a technology player created in 2017, at the forefront of AI research, specializing in innovative architectures and operational efficiency of business processes.
Our expertise is based on the work of our internal research laboratory, created in collaboration with the Ecole Polytechnique, in which doctors work daily on fundamental and experimental research on AI and NLP.
Safety is at the heart of our business. We devote a lot of resources and energy to :
Building a long-lasting and trusting relationship with our clients is essential to us. With the increasing exposure of web platforms to IT security threats, we take our role in protecting our infrastructure very seriously and work daily to strengthen our services.
That’s why Novelis has set up a security approach with the aim of achieving market reference labels and certifications, which are a guarantee of quality and confidence for you.
Our employees are committed to this approach and contribute to it actively on a daily basis. They are responsible for ensuring that the security regulations are known, understood and applied within their area of responsibility and within their mission. Vigilant, they are constantly on the alert during their various uses of the information systems, in order to detect possible incidents and adopt the appropriate behavior in a risky situation.
This Information Systems Security Policy is applicable to the subcontracting relationship between Novelis and its Clients, to the web solutions Novelis develops for its clients, and to the data that the Client subcontracts to Novelis.
At Novelis, the learning and application of security measures starts when employees are recruited, so that the security culture is spread throughout the company. Every employee is aware of the threats to the information systems and therefore knows their responsibilities towards them. This enables them to take on the role of a permanent player.
To this end, training in the proper use of IT resources is provided to each employee as soon as he or she joins Novelis and is regularly supplemented by additional training.
Novelis employees who develop and build our clients’ solutions are regularly trained in web security best practices, including the OWASP Top Ten.
Effectively ensuring the security of our information systems requires knowledge of security needs. This is why each asset – hardware, workstation, server, etc. – is subject to a detailed inventory and then classified with an associated owner.
A disposal procedure is formalized and implemented when an asset is removed or disposed of from the information system.
One of the essential factors in the security of the Information System is the management of physical and logical access: this is based on effective processes that allow for the proper management of identities, their permanent updating and robust authentication mechanisms.
Thus, each user accessing the Novelis Information System is duly identified and authenticated. Each account is linked to a unique individual in order to guarantee the traceability of accesses and actions.
The rights and authorizations issued to users are defined according to their business profile and in compliance with the principles of least privilege and separation of powers in order to guarantee data confidentiality. A review of accounts is carried out every 6 months to ensure the legitimacy of all accounts.
Documenting methodologies, processes and actions is an essential element for their proper application.
Therefore, documentation is regularly updated. It standardizes practices within Novelis and is used and implemented at all levels of the company..
At Novelis, we actively implement physical security policies at both our facilities.
A variety of physical protection measures are implemented including:
Each user of the Information System also participates in physical security by respecting good practices, such as the closing of offices, the “clean desk” policy, the lock-down of workstations during absences, or the reinforced protection of sensitive documentation.
Access to the workstation is only possible after a mandatory authentication phase (password or biometrics). Each workstation is equipped with a regularly updated antivirus software.
All contracts with our subcontractors include strict security requirements that apply and the means to monitor compliance with these requirements.
The requirements we have for our subcontractors are at least equivalent to our own internal security requirements, in order to meet our commitment to a high level of information systems security.
A network partitioning and containment policy is in place within Novelis networks. This partitioning is accompanied by an internal and external filtering policy to fight against malicious codes.
Our solutions hosted in our partners’ datacenters are protected (firewall & hardening) and there is no direct connection with Novelis internal environments.
Remote access to Novelis’ information system is done via an encrypted VPN and 2MFA.
Several encryption measures are implemented to ensure the confidentiality of the information and data processed.
First, all workstations and terminals are password-protected to ensure that information is inaccessible to unauthorized persons.
Media containing information are protected against unauthorized access by physical and hardware safeguards.
Novelis never accesses or uses your data except as expressly stated in our contracts, or as documented by your instruction. Your data is also never sold to third parties.
At Novelis, we are aware of the various threats that constantly plague web applications. For this reason, we have taken the necessary security measures to ensure the protection of the data processed by our sites.
We systematically apply several principles for the security of our clients’ environments:
In the design of our solutions, we also systematically apply strong safety principles:
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |