Claim payouts from infringers at zero cost

Talk to our sales team: Sales:

+1-385-853-5847
Red Points
  • Product

    • Products

      • Brand Protection

        Remove counterfeits across marketplaces, websites, social media, ads, and more

      • Anti Piracy

        Cut access and remove illegal content at scale

      • Domain Management

        Detect, monitor, and reclaim domains misusing your brand

      • Impersonation Removal

        Remove fake sites, profiles, and ads before they damage your brand

      • Gray Market

        Block unauthorized sellers and parallel imports

      • Social Video Growth

        Protect your video content and monetize it on social platforms

      • Revenue Recovery Program

        Permanently remove sellers and recover revenue with zero-cost litigation

        Apply now
    • Ready to see Red Points in action?

      Request your demo
  • Coverage

    • Coverage

      • Ads

      • Fake Websites

      • Marketplaces

      • Search Engines

      • Social Media

      • Mobile App Protection

      • Domains

      • Video Platforms

    • Use Cases

      • Domain Takedown

      • Intellectual Property

      • Copyright Infringement Protection

      • Social Media Protection Software

      • Trademark Monitoring Software

      • Domain Monitoring Service

      • DMCA Takedown Service

      • Trademark Protection Services

      • View all use cases

  • Pricing

  • Clients

  • Company

    • Company

      • About Us

      • Why Red Points

      • Reviews

      • Partners

    • Scaling counterfeit takedown with computer vision

      View case study
    • Scaling brand protection with technology

      View case study
  • Resources

    • Resources

      • Knowledge Center

      • Blog

      • Press Room

      • Webinars

      • Podcast

    • Annual report 2025

      The Counterfeit Buyer Teardown

      Discover what’s driving online knock-off purchases, where they’re happening, and how AI is reshaping the game.

      Download report
  • Talk to sales

  • Request demo

Red Points
  • EN
    • ES
    • DE
  • Product

    • Products

      • Brand Protection

        Remove counterfeits across marketplaces, websites, social media, ads, and more

      • Anti Piracy

        Cut access and remove illegal content at scale

      • Domain Management

        Detect, monitor, and reclaim domains misusing your brand

      • Impersonation Removal

        Remove fake sites, profiles, and ads before they damage your brand

      • Gray Market

        Block unauthorized sellers and parallel imports

      • Social Video Growth

        Protect your video content and monetize it on social platforms

      • Revenue Recovery Program

        Permanently remove sellers and recover revenue with zero-cost litigation

        Apply now
    • Ready to see Red Points in action?

      Request your demo
  • Coverage

    • Coverage

      • Ads

      • Fake Websites

      • Marketplaces

      • Search Engines

      • Social Media

      • Mobile App Protection

      • Domains

      • Video Platforms

    • Use Cases

      • Domain Takedown

      • Intellectual Property

      • Copyright Infringement Protection

      • Social Media Protection Software

      • Trademark Monitoring Software

      • Domain Monitoring Service

      • DMCA Takedown Service

      • Trademark Protection Services

      • View all use cases

  • Pricing

  • Clients

  • Company

    • Company

      • About Us

      • Why Red Points

      • Reviews

      • Partners

    • Scaling counterfeit takedown with computer vision

      View case study
    • Scaling brand protection with technology

      View case study
  • Resources

    • Resources

      • Knowledge Center

      • Blog

      • Press Room

      • Webinars

      • Podcast

    • Annual report 2025

      The Counterfeit Buyer Teardown

      Discover what’s driving online knock-off purchases, where they’re happening, and how AI is reshaping the game.

      Download report
  • Talk to sales

  • Request demo

Security Policy

Introduction

The RED POINTS Security Policy reflects the concepts, principles, responsibilities and objectives in security matters, the results of which allow the company to guarantee the necessary freedom of action.

The objective of the Integral Security of RED POINTS is to protect the people who work in the company, the confidentiality of their communications and the integrity of their information. It also watches over the other assets that make up the company’s patrimony, such as facilities or contents of all kinds.

Integral Security comprises the traditional concepts of physical security and logical (technological) security in order to maintain business continuity in the face of any adverse circumstance.

An increased “security culture” in the company’s personnel will provide clear benefits by increasing the security of systems and procedures, and will minimize the risk of potential malicious actions.

It is essential that all information concerning safety issues flows through the appropriate channels to the company’s decision-making bodies.

Principles

  • Integration. Global Security is an integrated process aligned with the business, in which the entire company participates.
  • Profitability. Security is guided by business criteria, taking into account the relationship between expenditure and investment. Its criteria are set centrally, taking advantage of any existing synergies. This management allows for an overall reduction in expenditure and a better return on the effort applied to security.
  • Continuity. Security must be present during the entire work cycle: protection, prevention, detection, response and recovery.
  • Adequacy. The means used must be adapted to the business environment. Among other factors, competition with other companies, social, political and economic disorders, amateur or professional hacking, etc., stand out for their impact on the business and on the organization’s security levels.

Responsibilities

The ultimate responsibility for safety lies with the management team, which is directly responsible for managing its development and implementation.

The Security Manager will analyze the security risks and vulnerabilities that may affect the proper functioning of the business and will propose the appropriate rules, means and measures to minimize them.

All personnel of the organization must assume responsibility for maintaining the security of the assets in their charge, observing the security standards implemented by the Security Manager.

Objectives

  • Achieve and maintain the level of security required to adequately guarantee business continuity, even in adverse situations.
  • Increase the integration and mutual support of the physical and logical aspects of security.
  • Collaborate in the management of other safety disciplines, including labor and environmental aspects, taking into account the criteria that promote Corporate Social Responsibility.
  • Establish the corporate security structure defined by the organization’s decision-making bodies and create the appropriate communication channels between all those involved.
  • Comply with official safety regulations and other requirements.
  • Establish and implement Training and Safety Dissemination Plans to improve personnel training.
  • Express commitment to continuous improvement.
  • Integrate the different departments of the company in a safety management system that, under common criteria, takes advantage of synergies and achieves consistency in resources and actions.

 

All RED POINTS personnel will know and apply the regulations that develop this Security Policy.

Red Points
  • Request Demo

  • Get in touch

    • Contact

    • Login

  • col

    • Platform

      • Brand Protection

      • Anti Piracy

      • Social Video Growth

      • NFT

      • Impersonation Removal

      • Domain Management

      • Investigation Services

      • Revenue Recovery Program

    • Resources

      • Knowledge Center

      • Blog

      • Press Room

      • Webinars

      • Podcast

  • col

    • Company

      • About Us

      • Why Red Points

      • FAQs

      • Pricing

      • Clients

      • Red Points Reviews

      • Partners

      • Jobs

      • Corporate Social Responsibility

      • Whistleblowing

      • Third Party Code of Conduct

  • col

    • Featured Use Cases

      • Domain takedown

      • Trademark Monitoring Software

      • Amazon Unauthorized Sellers Enforcement Service

      • Copyright Infringement Protection

      • Digital Rights Management Software

      • Intellectual Property

      • How to Prevent Software Piracy

      • Business Impersonation Removal

      • Amazon Brand Protection Services

      • Anti Counterfeit Solution | Anti Counterfeit Software

Google's Trusted Copyright

Youtube-Certified Multi-
Channel Network

New York

135 Madison Ave, 5th Floor, New York, NY 10016

Barcelona

Berlín Street, 38-48, 1 08029
Barcelona, Spain

Beijing

Diplomatic Office Building No.19, Dongfang Dong Road, Chaoyang District, Beijing (100016)

Salt Lake City

Office 460 West 50 North Salt Lake City, UT 84101

©2014—2025 Red Points

  • EN
    • ES
    • DE
  • Legal Notice and Terms of Use

  • Data Protection Policy

  • Cookies Declaration

  • Security Policy

Request demo

Sales: +1-385-853-5847

Receive a free call from us today

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}