Policy
Version 1.0 · Last updated: May 20, 2026
Owner: Security Lead · Reviewed annually
This policy describes how Nexma identifies, contains, investigates, and discloses security incidents affecting the Nexma platform, customer data, or Nexma personnel and systems.
It applies to all production environments and to any system that stores or processes customer data. It is binding on Nexma employees, contractors, and on-call responders.
Roles in an incident are assigned at declaration time. A single person may hold multiple roles in smaller incidents.
Incidents may be detected through several channels. All of them feed the same intake process:
Each declared incident is assigned a severity at declaration. Severity may be revised as more is known.
Confirmed unauthorized access to customer data, full production outage, or active exploitation of a critical vulnerability.
Page Security Lead and executive sponsor immediately. 24/7 response. Customer and regulatory notification considered from the outset.
Suspected unauthorized access, significant degradation affecting many customers, or a confirmed high-severity vulnerability without active exploitation.
Page Security Lead. Response begins within one business hour and continues through business hours until contained.
Localized issue with limited customer impact, contained policy violation, or a moderate vulnerability that requires remediation but is not actively exploited.
Tracked by the Security Lead; resolved within normal sprint cadence with documented remediation.
Informational events, minor policy gaps, or low-severity findings that do not require an immediate response.
Logged for trend analysis and addressed in routine work.
Incidents follow a phased response. Each phase is logged so the post-incident review can reconstruct what happened.
For confirmed personal data breaches affecting customer data, Nexma will notify the affected customer without undue delay and, where feasible, within 72 hours of confirmation. The notification will describe the nature of the breach, the categories of data affected, the likely consequences, and the measures Nexma has taken or proposes to take.
Where Nexma acts as a processor under applicable data protection law, the customer (controller) is responsible for downstream notification to regulators and data subjects. Nexma will provide the information the controller reasonably needs to meet that obligation.
For non-breach incidents that materially affect service availability or trust, Nexma will publish an incident summary on its status page and, where appropriate, write a public post-incident report.
Every Sev1 and Sev2 incident generates a written post-incident review within 14 days of closure. The review is blameless: it focuses on systems, controls, and decisions, not on individuals.
Reviews include a timeline, the root cause, what worked, what did not, and a list of concrete follow-up actions with owners and target dates. Action items are tracked to completion.
Nexma maintains internal templates for incident communications — customer notifications, status page updates, regulator notifications, and public post-incident reports — so responders can communicate quickly and consistently under pressure.
Templates are reviewed annually and after any incident that exposes a communication gap.
Nexma runs at least one tabletop exercise per year. Exercises walk responders through a realistic scenario — a confirmed data exposure, a critical vendor breach, or a credential compromise — to test the response process end-to-end.
Findings from each exercise feed back into this policy, into the communication templates, and into engineering follow-up where the platform itself needs to change.
To report a suspected security incident or vulnerability affecting Nexma, contact the security team. Encrypted reporting is available on request.
Email: legal@nexma.ai