ExhibitPower

Information Security Policy

Effective as of March 1, 2026  |  Version 2.0
This Information Security Policy ("Policy") governs the security practices of ExhibitPower LLC with respect to all systems, data, applications, and personnel. This Policy applies to all employees, contractors, vendors, and any other individual or entity with access to ExhibitPower resources.

Access to ExhibitPower systems, applications, or data is contingent upon strict adherence to this Security Policy. Failure to comply may result in immediate termination of access and pursuit of all available legal and equitable remedies.

1. General Security Principles

This Information Security Policy is in service of the three core goals of information security:

PrincipleDescription
ConfidentialityEnsuring that data and information are accessible only to those authorized to access it.
IntegritySafeguarding the accuracy and completeness of data and processing methods.
AvailabilityEnsuring that authorized users have access to information and systems when required.

This policy relates to all ExhibitPower web servers, application servers, database servers, development environments (including local and cloud-based environments), and any machine, resource, or account related to the development, deployment, maintenance, support, reporting or analysis of the ExhibitPower web and mobile applications and related data.

All individuals and entities with access to ExhibitPower resources must comply with the following standards:

Enforcement: Failure to adhere to this policy shall provide ExhibitPower the right to terminate, cancel, or modify the employment, contractual, or other relevant relationship between ExhibitPower and the non-conforming party, and the right to pursue all available legal and equitable remedies.

2. Password, Access, and Authorization Policy

Access rights to ExhibitPower electronic resources will be accorded following the principles of least privilege and need-to-know. Elevated access rights (e.g., local administrator, domain administrator, super-user, root access) shall be restricted and controlled.

Authorization shall be provided only by the system administrator, who shall notify ExhibitPower management or the project manager upon the addition of each new user, including the scope of access and level of authorization granted. All users granted access must be made aware of the confidentiality provisions of all relevant agreements.

2.1 Password Requirements

All users, including contractors and vendors, are responsible for selecting and maintaining secure passwords in accordance with the following:

2.2 Access Provisioning and Deprovisioning

3. Database Security Policy

Access to ExhibitPower's internal databases by software programs must be granted only after proper authentication with credentials. The following standards apply:

Developer Responsibility: Developer groups must maintain a documented process for controlling and rotating database passwords, including a method for restricting knowledge of database passwords to a need-to-know basis.

4. Data Access and Integrity Policy

No person shall make direct access to system data, including but not limited to user information, except as necessary to achieve their legitimate and assigned business purpose and within the properly granted scope of their authorization.

5. Physical Security Policy

ExhibitPower data from all applications and systems shall reside only in approved locations:

  1. On ExhibitPower servers, where it shall be appropriately replicated for the purposes of data restoration or recovery;
  2. On backup servers contracted by ExhibitPower;
  3. On approved cloud storage (currently: Microsoft Azure and Google Drive).

No ExhibitPower data — including user information — shall be copied to or stored on any other physical medium, except in the course of and to the extent necessary to successfully complete development, deployment, or end-user support activities, in accordance with all other policies herein.

Prohibited Storage: ExhibitPower data may never be transferred or copied to a portable hard drive, USB drive, CD, DVD, or similar removable medium.

In the event that any data is transferred or copied to a computing device as described above, that device must be capable of remote disabling in the event of physical loss or theft.

ExhibitPower source code shall reside solely on computing devices and servers necessary for development, deployment, maintenance, and support of ExhibitPower applications. Access to any such server or device, including version control platforms such as Azure DevOps, shall be administered in accordance with all policies contained in this Information Security Policy.

6. Data Transmission Policy

All user and customer data transmitted between the ExhibitPower web and mobile applications and any server — including web servers, database servers, and notification or email servers — shall use TLS 1.2 or higher (minimum 256-bit encryption).

Note on SSL vs. TLS: References to "SSL" in previous versions of this policy referred generally to encrypted transmission. ExhibitPower now requires TLS 1.2 or higher. SSL and TLS 1.0/1.1 are deprecated and must not be used.

7. Incident Response Policy New

ExhibitPower maintains an incident response process to address potential or actual security breaches in a timely and structured manner.

7.1 Reporting Requirements

7.2 Response Steps

  1. Contain: Immediately isolate affected systems to prevent further damage;
  2. Assess: Determine the scope, nature, and impact of the incident;
  3. Notify: Inform ExhibitPower management and, where required by law, affected parties and regulators;
  4. Remediate: Address the root cause and restore secure operations;
  5. Document: Record the incident, response actions taken, and outcomes for future reference and compliance.

7.3 Breach Notification

In the event of a data breach affecting personal information, ExhibitPower will comply with applicable state and federal breach notification laws, including the Texas Identity Theft Enforcement and Protection Act and other applicable regulations, notifying affected individuals and authorities within legally required timeframes.

8. AI and Third-Party Tool Usage Policy New

As ExhibitPower increasingly uses AI-assisted development tools and third-party integrations, the following security standards apply:

9. Policy Compliance and Enforcement

ExhibitPower management is responsible for ensuring compliance with this policy. All personnel are required to:

This policy will be reviewed at least annually and updated as necessary to reflect changes in technology, law, and best practices.

10. Contacting Us

Questions regarding this Information Security Policy or to report a security concern should be directed to ExhibitPower management:

ExhibitPower LLC
7885 Northcourt Rd, Suite #100
Houston, TX 77040

Security Contact: support@exhibitpower.com
Phone: 713.939.9252