Access Control Policy

Access Control Policy

At the very heart of Information Security lay the principles of Authentication, Authorization and Accountability, also known as AAA. In plain language, these principles state that: a. Every action of a system, application or person that may affect the security of an...
Information Risk Management Policy

Information Risk Management Policy

The Company has adopted an Information Risk Management Policy (“Policy”) to describe rules and expectations for both itself and all its direct and indirect subsidiaries countrywide (together with the Company) concerning roles and responsibilities for identifying and...
Technology Risk Policy – Template 2

Technology Risk Policy – Template 2

Information and the supporting business applications, IT processes, databases and underlying infrastructure are important assets of Company and, like other important assets, must be suitably protected. The availability, integrity and confidentiality of information...
Technology Risk Policy – Template 1

Technology Risk Policy – Template 1

The objectives of the Technology Risk Policy are to ensure that Technology Risks are proactively identified, well understood, and prudently managed in order to support the achievement of business objectives and to fully comply with any related regulatory and corporate...
Cryptographic Control Policy

Cryptographic Control Policy

The Cryptographic Control Policy intends to draw the general principles acceptable to the Company for the usage of cryptography. This policy applies to all employees and partners and to all electronic transactions wherein one or more of the abovementioned parties are...