Skip to main content
ABV’s security and compliance program is built on comprehensive internal policies covering every aspect of information security, privacy, and AI governance. Our policies are organized into categories aligned with our ISO 27001 and ISO 42001 certifications:

AI Governance Policies

  • AI Policy
  • AI Ethics Policy
  • AI Risk Management Policy
  • AI Systems Lifecycle Policy
  • AI Data Handling SOP
  • AI Security SOP
  • AI Development and Evaluation Policy
  • Responsible AI Governance Policy

Security Control Policies

  • Corporate Security Policy
  • Organizational Controls Policy
  • Technological Controls Policy
  • People Controls Policy
  • Physical Controls Policy
  • Password Management Policy
  • Use of Cloud Services SOP

Data Protection Policies

  • Data Protection Policy
  • Data Classification Policy
  • Data Retention Policy
  • Data Retention Schedule

Operational Resilience Policies

  • Incident Response Plan
  • Business Continuity Plan
  • Disaster Recovery Policy
  • Responsible Disclosure Policy
  • Vulnerability Management

Additional Governance Policies

  • Risk Assessment Policy
  • Software Development Lifecycle Policy
  • Secure SDLC SOP
  • ISMS & AIMS Plan
  • Background Check SOP
  • BCP Tabletop Exercise SOP
  • IR Tabletop Exercise SOP
  • BYOD Policy
  • Code of Conduct

Accessing Policy Documentation

Enterprise customers undergoing detailed vendor security assessments can request access to relevant policy documentation. Full policy documents contain implementation details and are provided under NDA. Summaries and attestations are available for compliance questionnaires without NDA.

How to Request

To request policy documentation:
  1. Email [email protected] from your company email
  2. Include your organization name and ABV account details
  3. Specify which policies you need (or “all policies” for comprehensive assessment)
  4. Provide context (vendor security assessment, audit, compliance review)
We typically respond within 1-2 business days and will coordinate NDA execution if needed for full policy access.