Information Security Policy
The organisation provides comprehensive consulting services, by utilizing the organisation’s intellectual property based on confidential information disclosed by its clients. The organisation consistently implements business ethics in its professional approach and business conduct. It has been attempting to establish an information management framework, recognizing the need to expressly reiterate its understanding that information security is one of the most important issues concerning the management and the business operations. The organisation establishes a basic policy on information security and will appropriately protect all information assets that it deals with by ensuring that it’s directors, officers and employees abide by the information security policy set out as below.
(a) Establishing of Information Security Management System: The organisation ensures that all directors, officers and employees understand the importance of information security and establish adequate system to ensure appropriate management of information assets and continuously seek to improve it.
(b) Legal and Regulatory Compliance: The organisation ensures that its framework for information security is in compliance and conformity in letter and spirit with the relevant local laws, regulations and other various standards.
(c) Information Assets Protection: In order to protect information assets of the organisation and it’s clients from threats to confidentiality, integrity and availability of such information assets and to ensure the continuity of its business, shall formulated appropriate management plans for it’s information assets, clients as well a business partners.
(d) Education and Training: The organisation continuously trains and educates its directors, officers and employees to raise their awareness of information security and implement an information security system in all of its business activities.
(e) Incident Response: The organisation implements appropriate measures to prevent incidents relating to information security but also takes steps to prevent the recurrence of similar incidents.