Skip to Content

Security Policy

1. Overview

HIX Corporation is committed to maintaining the security and integrity of the systems, data, and services supporting our websites and manufacturing operations.

This Security Policy outlines our approach to protecting information and infrastructure across our digital platforms.

2. Information Security Controls

We employ a layered security approach, including:

  • Role-based access control
  • Strong authentication practices
  • Network segmentation
  • Secure cloud and on-premise infrastructure
  • Encrypted communications (TLS/HTTPS)
  • Routine system updates and patching

3. Data Protection

  • Sensitive data is restricted to authorized personnel only
  • Payment data is processed through PCI-compliant third-party providers
  • Uploaded customer artwork and files are stored securely and access-limited

4. Monitoring and Incident Response

We monitor systems for:

  • Unauthorized access
  • Abuse or anomalies
  • Availability issues

In the event of a security incident, we take prompt action to:

  • Contain the issue
  • Investigate root cause
  • Restore services
  • Notify affected parties where legally required

5. Vendor and Third-Party Security

Third-party service providers are evaluated for security posture and must meet contractual confidentiality and data protection requirements.

6. Responsible Disclosure

We welcome responsible disclosure of security vulnerabilities.

If you believe you have identified a security issue, please contact:

[email protected]

Please do not publicly disclose vulnerabilities until we have had an opportunity to investigate and remediate.

7. Policy Changes

This Security Policy may be updated periodically to reflect changes in technology, threats, or regulatory requirements.