by IT Procedure Template | Jan 15, 2023
At the very heart of Information Security lay the principles of Authentication, Authorization and Accountability, also known as AAA. In plain language, these principles state that: a. Every action of a system, application or person that may affect the security of an...
by IT Procedure Template | Nov 3, 2022
The Company has adopted an Information Risk Management Policy (“Policy”) to describe rules and expectations for both itself and all its direct and indirect subsidiaries countrywide (together with the Company) concerning roles and responsibilities for identifying and...
by IT Procedure Template | Nov 3, 2022
Information and the supporting business applications, IT processes, databases and underlying infrastructure are important assets of Company and, like other important assets, must be suitably protected. The availability, integrity and confidentiality of information...
by IT Procedure Template | Nov 3, 2022
The objectives of the Technology Risk Policy are to ensure that Technology Risks are proactively identified, well understood, and prudently managed in order to support the achievement of business objectives and to fully comply with any related regulatory and corporate...
by IT Procedure Template | Oct 14, 2022
The Cryptographic Control Policy intends to draw the general principles acceptable to the Company for the usage of cryptography. This policy applies to all employees and partners and to all electronic transactions wherein one or more of the abovementioned parties are...