Security Policy
Last Updated: 03/16/2026
BEST Robotics Inc. is committed to protecting the confidentiality, integrity, and availability of information used in its programs, competitions, and operations. This policy establishes basic security requirements for individuals who access BEST systems or data.
1. Scope
2. Information Protection
- participant and volunteer contact information
- team registration records
- program and operational data
Access to sensitive information is limited to individuals who require it for program administration or operational responsibilities.
3. Access and Authentication
Users must protect access credentials and follow secure login practices, including:
- using strong passwords
- not sharing accounts or passwords
- enabling additional security measures where available
Access to systems may be removed when no longer required
4. Secure Use of Systems
Individuals using BEST technology resources should:
- keep devices and software updated
- avoid suspicious links, attachments, or downloads
- use approved platforms for storing or sharing organizational data
- report lost devices or suspicious activity promptly
5. Security Incidents
Any suspected security issue, including unauthorized access, data loss, or cyberattacks, should be reported promptly to BEST Robotics Inc. leadership or designated technical staff.
BEST may investigate incidents and take appropriate corrective actions.
6. Third-Party Services
BEST Robotics Inc. may use third-party technology providers to support program operations.
These services are selected with consideration for appropriate security and privacy protections.
7. Policy Compliance
Failure to follow this policy may result in restricted access to systems or removal from roles involving BEST technology resources.