Information Security Policy
Glocert International is committed to protecting the confidentiality, integrity, and availability of information assets. We recognize the importance of information security and the need to protect our information assets from unauthorized access, disclosure, alteration, and destruction. We are committed to ensuring that our information assets are protected from all security threats and vulnerabilities.
This Information Security Policy is designed to provide a framework for establishing and maintaining an effective information security management system (ISMS) that ensures the confidentiality, integrity, and availability of information assets. This policy applies to all information assets owned, controlled, or processed by Glocert International, including information assets that are shared with third parties.
The objectives of this Information Security Policy are to:
- Protect information assets from unauthorized access, disclosure, alteration, and destruction.
- Ensure the confidentiality, integrity, and availability of information assets.
- Comply with all applicable legal, regulatory, and contractual requirements.
- Identify and manage information security risks.
- Ensure that information security responsibilities are defined and communicated to all employees, contractors, and third parties.
- Ensure that information security incidents are reported, investigated, and resolved in a timely manner.
- Ensure that information security controls are implemented and maintained to protect information assets.
- Ensure that information security awareness and training programs are provided to all employees, contractors, and third parties.
- Ensure that information security performance is monitored, measured, and reviewed on a regular basis.
- Ensure that information security policies, procedures, and guidelines are reviewed and updated on a regular basis.
This Information Security Policy is supported by a set of information security policies, procedures, and guidelines that define the requirements for protecting information assets. These documents are designed to provide detailed guidance on how to implement and maintain information security controls to protect information assets from security threats and vulnerabilities.
All employees, contractors, and third parties are required to comply with this Information Security Policy and all related information security policies, procedures, and guidelines. Failure to comply with this policy may result in disciplinary action, up to and including termination of employment or contract.
This Information Security Policy is reviewed and updated on a regular basis to ensure that it remains relevant and effective. All changes to this policy are communicated to all employees, contractors, and third parties to ensure that they are aware of their information security responsibilities.
If you have any questions or concerns about this Information Security Policy, please feel free to contact us.