Our Information Security Policy
IBSS Technology
Our Information Security Policy
1. PURPOSE
The purpose of the Information Security Policy is to ensure business continuity at IBSS, prevent security breaches by minimizing risks, and minimize the risk of damage by mitigating potential impacts.
2. RESPONSIBILITIES
ISMS Sponsor
3. IMPLEMENTATION
- IBSS ISMS Sponsor has approved the Information Security Policy.
- The Security Policy ensures the following:
- Information will be protected against any unauthorized access;
- Confidentiality of information will be ensured;
- Information integrity will be maintained;
- Accessibility to information regarding the preserved business processes will be ensured;
- Legal and regulatory requirements and provisions in contracts with third parties (business partners, customers, suppliers) will be constantly monitored and met;
- Business Continuity Plans will be developed, maintained and tested;
- Information Security Training will be valid for all employees;
- All actual or suspected information security breaches will be reported to the Information Security Manager and investigated.
- Combating global climate change
- Procedures have been prepared to support the policy (virus protection, encryption and continuity plans, etc.).
- Ensuring the availability of information and systems for business needs.
- The Information Security Manager is responsible for providing support and consultancy during the maintenance and implementation of the policy.
- All managers are directly responsible for ensuring that the policy is implemented and understood by staff in their respective departments.
- Compliance with the Information Security Policy is a mandatory document for anyone collaborating or working with IBSS.
As IBSS,
Within the scope of establishing an Information Security Management System (ISMS), we aim to:
• Establish a risk management methodology for our company, customers, and suppliers, which includes defining information assets, identifying risks, and implementing risk control measures to comply with the principles of confidentiality, integrity, and accessibility of information, which are requirements of the Information Security Management System.
• Protect the confidentiality of our customers’ information and ensure compliance with standards and legal regulations.
• Provide and maintain the necessary resources for hardware, software, training, and other controls to mitigate information security risks.
• Provide awareness, training, and incentives to ensure the participation and compliance of all personnel and business partners with the ISMS, as required by the holistic approach to information security.
• Control, monitor, and review the effectiveness of the ISMS through internal and external audits, and continuously ensure compliance and improvement.
Our ISMS policy is to:
GENERAL MANAGER
10.02.2018