Barcelon Associates Management Corporation | Trust Center
BAMC's Trust Center
BAMC is committed to ensuring the confidentiality, integrity, and availability of your data. Here is how we protect information and comply with industry standards and regulations.
FAQs

Monitoring

Continuously monitored by Secureframe

Subprocessors

ADP

Payroll, HR, and tax services

Freshworks

IT Service Management and Ticketing

HD Supply

Property improvement, custom products, business services

Keeper Security

Password Manager

Microsoft

Cloud computing (Azure), productivity suites (Microsoft 365), operating systems (Windows), and business solutions (Dynamics 365)

Proofpoint

Email security, identity threat defense, data loss prevention, electronic discovery, and email archiving

RealPage

Real estate rental technology platform

Umpqua Bank

Banking

Yardi

Real estate portfolio software

FAQs

We protect residents’ sensitive information by using encrypted systems, secure storage, and strict access controls for both digital and physical records. Only authorized personnel are allowed access, and regular audits are conducted to ensure compliance.
We separate staff Wi-Fi from public Wi-Fi, using strong encryption like WPA3 and secure passwords. Public Wi-Fi is isolated from our internal business systems to prevent unauthorized access.
If a cybersecurity incident occurs, it must be immediately reported to IT or management for swift action. We follow a documented Incident Response Plan to contain the issue and minimize damage.
Passwords must be strong, unique, and changed from any vendor defaults. Where possible, Multi-Factor Authentication (MFA) is required to add an extra layer of protection.
Vendors are required to sign security agreements that mandate breach notification within 48–72 hours. We also conduct regular vendor risk reviews to ensure their cybersecurity practices meet our standards.
When a resident moves out or an employee leaves, we immediately revoke system access and securely delete or shred sensitive information. No information is left accessible beyond the individual’s relationship with the property.
Building systems are secured behind firewalls and access is limited to authorized staff only. Firmware updates and vulnerability patches are applied regularly to keep systems protected.
Staff receive cybersecurity training at least once a year. Training focuses on phishing, password safety, protecting resident data, and properly reporting suspicious activities.
A designated Privacy Officer or manager will log, investigate, and respond to all resident privacy complaints within a set timeframe, usually 30 days. We take all complaints seriously and document the resolution process carefully.
Yes, depending on the location, we must comply with state privacy laws like CCPA and potentially HIPAA-adjacent regulations if medical information is handled. We also align our security practices with national standards like CIS Controls IG1 to demonstrate responsible cybersecurity.

Monitoring

Change Management

Configuration and Asset Management Policy
A Configuration and Asset Management Policy governs configurations for new sensitive systems
Segregation of Environments
Development, staging, and production environments are segregated.

Availability

Business Continuity and Disaster Recovery Policy
Business Continuity and Disaster Recovery Policy governs required processes for restoring the service or supporting infrastructure after suffering a disaster or disruption.

Organizational Management

Information Security Program Review
Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually.

Confidentiality

Data Retention and Disposal Policy
A Data Retention and Disposal Policy specifies how customer data is to be retained and disposed of based on compliance requirements and contractual obligations.
Data Classification Policy
A Data Classification Policy details the security and handling protocols for sensitive data.

Vulnerability Management

Vulnerability and Patch Management Policy
A Vulnerability Management and Patch Management Policy outlines the processes to efficiently respond to identified vulnerabilities.

Incident Response

Incident Response Plan
An Incident Response Plan outlines the process of identifying, prioritizing, communicating, assigning and tracking confirmed incidents through to resolution.

Risk Assessment

Vendor Risk Management Policy
A Vendor Risk Management Policy defines a framework for the onboarding and management of the vendor relationship lifecycle.

Access Security

Removal of Access
Upon termination or when internal personnel no longer require access, system access is removed, as applicable.
Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and information
Complex Passwords
Personnel are required to use strong, complex passwords and a second form of authentication to access sensitive systems, networks, and information