▶ 1) Scope & Definitions
Scope: All client media, project files, documents, and communications handled during pre-production, production, post-production, and delivery.
Client Material
Footage, audio, graphics, scripts, metadata, edits, grades, and deliverables.
Systems
On-prem workstations/storage, approved transfer/review tools, and vetted portable media.
▶ 2) Data Classification
- Restricted — Embargoed content / sensitive PII.
- Confidential — Standard commercial projects without PII.
- Internal — Non-client operational docs.
Classification is set at kickoff; the highest class applies to derivatives.
▶ 3) Access Control
- Least privilege access only.
- Authentication: unique accounts, strong passwords (≥12 chars), 2FA where available.
- Off-boarding: accounts disabled within 24h of project end.
- Guest access: named accounts or expiring password-protected links.
▶ 4) Workstations & Storage
- OS/apps kept current; licensed software only.
- Full-disk encryption where supported (workstations/portable SSDs).
- LAN segmented; guest Wi-Fi isolated from production storage.
- Offline workflows (air-gapped) available upon request.
▶ 5) Encryption & Transfer (Service-Neutral)
Policy: We avoid naming specific vendors in the policy. Approved transfer/review services are defined per project in the SOW. If a client specifies a platform, we provision a temporary paid account and operate under their requirements.
Standard Protected Link (Default)
- TLS 1.2+ in transit; provider encryption at rest.
- Password, link expiry, download-attempt limits, recipient scoping, notifications.
Encrypted Archive (High Sensitivity)
- Deliverables wrapped in AES-256 encrypted archive (
ZIP-AES/7z). - Encrypt file names when using 7z; for ZIP, file names may be visible.
- Password shared via a separate channel (e.g., phone/Signal). Optional
SHA-256checksum.
Other Options
- SFTP / Managed file transfer (account-based auth, audit logs) upon request.
- Physical delivery on encrypted SSD/HDD via bonded courier.
We do not use anonymous public uploaders for client deliverables.
▶ 6) Remote Review (Color-Accurate)
- Secure (TLS) session; color-managed output matched to grading environment.
- Time-limited links; watermarking where supported; downloads disabled by default.
- End-to-end encrypted monitoring can be arranged upon request with approved tools.
▶ 7) Retention & Deletion
- Working data: 30 days after final approval (default).
- Delivery masters: 90 days (safety copy), then delete or archive per client instruction.
- Secure deletion; links auto-expire.
- Long-term archiving available as a paid option.
▶ 8) Backups & Business Continuity
- Nightly backups to a separate tier; offline option for Restricted projects.
- UPS on critical systems; incident plan for disaster events.
▶ 9) Logging & Monitoring
- Access logs retained ≥90 days.
- Admin actions logged (permissions, link creation).
- Anomalies may trigger link revocation and investigation.
▶ 10) Third-Party Services (Service-Neutral)
- Only vetted vendors with published security controls.
- Per-project selection: the SOW defines the specific platform(s). If the client mandates one, we provision it for the project.
- Data hosting regions selected to fit project needs where feasible.
▶ 11) Incident Response
- Report suspected incidents within 1 hour.
- Contain, preserve logs, revoke access, switch to offline if needed.
- Notify affected clients within 24 hours of confirmation; RCA within 5 business days.
▶ 12) Physical Security
- Controlled access to production rooms; visitor escort & sign-in.
- Media stored in locked cabinets after hours.
- No filming or screen capture in color/online rooms without authorization.
▶ 13) Privacy & Compliance
- We minimize personal data; process PII only under client direction.
- We sign NDAs and DPAs as required.
▶ 14) Client Responsibilities
- Provide classification and retention requirements.
- Share passwords via a separate channel and keep them confidential.
- Confirm delivery recipients; report exposed credentials promptly.
▶ 15) Change Management & Versioning
- Reviewed at least annually or after material workflow/tooling changes.
- Version history tracked; latest revision available on request.
▶ Appendix A — SOP: Encrypted Archive Delivery (ZIP-AES/7z)
- Export approved deliverables to the secure “Exports” folder.
- Create archive with AES-256 and encrypt file names (7z) when applicable.
- Generate unique passphrase (≥16 chars) and store in the team password manager.
- Produce a
SHA-256checksum text file. - Send via approved transfer with password + expiry; share the password out-of-band.
- Confirm checksum; revoke link at acceptance.
▶ Appendix B — SOP: Standard Protected Link
- Upload to approved service.
- Set password, expiry (≤7 days), download limit, recipient emails.
- Enable notifications; store the URL in the project log.
- Revoke after acceptance or expiry.
▶ Appendix C — SOP: Remote Review
- Create a time-limited review link; enable watermarking where supported.
- Provide viewing instructions (browser/display settings); disable downloads by default.
- Remove access after session; archive comments in the project log.
▶ Defaults You Can Customize
- Working-data retention: 30 days after approval.
- Master retention: 90 days.
- Transfer/review vendor: defined per project in the SOW (service-neutral; provisioned on demand if client-specified).
- Archive encryption: optional by request.
- Hosting region preference: JP/US/EU (select per project).
Owner: IDH Co., Ltd. | Contact
© All rights reserved.