Skip to main content

Data Trust Center

Access the Skej Trust Center

Updated over 2 months ago

Security & Trust at Skej

At Skej, we take the security, confidentiality, integrity, and availability of your data seriously. Our security and compliance program is built on industry best practices and guided by the following mission:

Mission Statement

“To establish and maintain the enterprise vision, strategy, and program to ensure the security, confidentiality, integrity, and availability of 3Gen Internet Corporation’s applications, systems, infrastructure, and data.”



Trust Center

You can access all of our current security and compliance documentation in the Skej Trust Center.

The Trust Center includes:

  • Our Information Security Policies

  • Our Business Continuity and Disaster Recovery Policy

  • Governance and risk management charters

  • And, once finalized, our SOC 2 Type II report



Available Policies

In the Trust Center, you’ll find documentation covering:

  • Information Security Policy

  • Chief Information Security Officer (CISO) Policy

  • Risk Assessment and Treatment Policy

  • Incident Response Policy

  • Network Security Policy

  • Access Control and Termination Policy

  • Baseline Hardening Policy

  • Data Classification Policy

  • Acceptable Use Policy

  • Personnel Security Policy

  • Vendor Management Policy

  • Change Management Policy

  • Business Continuity and Disaster Recovery Policy

  • Risk and Governance Executive Committee Charter

  • Information Technology Leadership Committee Charter


👉 For the most up-to-date versions of these documents and to access our SOC 2 report when available please visit the Skej Trust Center.

Did this answer your question?