Information Security Management System Policy
- Information shall be protected against any unauthorized access,
- Information security shall be provided,
- Information integrity shall be preserved,
- Accessibility to preserved business processes shall be procured,
- Legal and Regulatory requirements and provisions in agreements executed with third parties (business partners, customers, suppliers) shall be continuosly monitored and fulfilled,
- Business Continuity Plans shall be developed, protected and tested,
- Information Security Training shall be applied to all employees,
- All actual or suspected information security breaches shall be reported to Information Security Manager and investigated.