Information Security Management System Policy

  • Information shall be protected against any unauthorized access,
  • Information security shall be provided,
  • Information integrity shall be preserved,
  • Accessibility to preserved business processes shall be procured,
  • Legal and Regulatory requirements and provisions in agreements executed with third parties (business partners, customers, suppliers) shall be continuosly monitored and fulfilled,
  • Business Continuity Plans shall be developed, protected and tested,
  • Information Security Training shall be applied to all employees,
  • All actual or suspected information security breaches shall be reported to Information Security Manager and investigated.