Laman ini menggunakan cookies untuk memastikan Anda mendapatkan pengalaman terbaik. Informasi lebih lanjut perihal informasi yang dikumpulkan dan digunakan silakan lihat Kebijakan Cookie dan Kebijakan Privasi
Information is protected from unauthorized access and modification, ensuring its confidentiality, integrity, and availability to users.
Achievement of information security objectives as key performance indicators of the Information Security Management System (ISMS).
Regular implementation and evaluation of information security risk assessments.
Availability of sufficient resources to effectively implement the Information Security Management System.
Consistent and effective implementation of Standard Operating Procedures related to the Information Security Management System.
All regulatory and legislative requirements are met, and employees receive regular information security training to maintain a high level of awareness and compliance.
Continuous improvement of the Information Security Management System’s performance.
Any breach or suspected weakness in information security is immediately reported, investigated, and addressed.