INFORMATION SECURITY POLICY
Follow our latest news and events
Follow our latest news and events
The purpose of this policy is to ensure the confidentiality, integrity, and availability of information assets belonging to the Company. The policy complies with all laws and regulations which is applicable to the Company and prevents the Company from intentional or accidental threats caused from inside or outside.
This policy has been adopted on any hardware, software, service, system, document which are used in the Company and the Company’s personnel, contractors, and visitors who use the said material.
To establish the adequate information security management system that ensure the confidentiality, integrity, and availability of information assets belonging to the Company, enhance employees’ awareness of information security, and upgrade IT equipment and network reliability.
The scope of information security management includes the following:
The information security manager should take appropriate procedures to implement this policy. All employees are obliged to report the information of security incidents, events and weaknesses. When an employee violates a rule related to information security, his or her liability with respect to information security shall be handled in accordance with disciplinary procedures and bear civil and criminal liability.
This policy shall be evaluated at least once per year .To ensure the feasibility and effectiveness of the Company’s information security operation such evaluations shall focus on whether this Policy complies with applicable legislation and is suited to the most current technologies and business practices.
This policy and any amendment hereto, shall be issued and implemented once it has been approved by the Chairman.