Confidential Information – Breaches and Escalation Policy
The Confidential Information – Breaches and Escalation Policy sets out the escalation procedures to follow in the event of a breach of confidential information within Company and requirements regarding the…
Cryptographic Control Policy
The Cryptographic Control Policy intends to draw the general principles acceptable to the Company for the usage of cryptography. This policy applies to all employees and partners and to all…
Cryptographic Controls Standard
The objective of the Cryptographic Controls Standard is to outline the minimum information security controls which must be applied when cryptographic services and solutions are utilized by the Company. Specifically,…
The objective of the Cryptography Policy and controls is to address confidential data that is at rest (including portable devices and removable media), in motion (transmission security), and encryption key…
Data Protection Policy
The Data Protection Policy outlines the principles that must generally be complied with when processing personal data, in particular when transferring such data. The objective of this policy is to…
Document Control Procedure
The Document Control Procedure details the procedure, which needs to be following, regarding the development and maintenance of internal policies and procedures at the Company.
Individual Computing Equipment Usage Policy
The objective of the Individual Computing Equipment Usage Policy is to help the Company Management enforce the rules regarding the use of individual computing equipment.
Information Assets Classification Policy
The Information Assets Classification Policy sets out the principles under which information is to be classified.
Information Classification Policy
Information classification is a process intended assigning a level of sensitivity to information/ data as it is being created, processed, stored or transmitted.