Information Security Management System (ISMS) Policy

  • Information is protected from unauthorized access and modification, ensuring its confidentiality, integrity, and availability to users.

  • Achievement of information security objectives as key performance indicators of the Information Security Management System (ISMS).

  • Regular implementation and evaluation of information security risk assessments.

  • Availability of sufficient resources to effectively implement the Information Security Management System.

  • Consistent and effective implementation of Standard Operating Procedures related to the Information Security Management System.

  • All regulatory and legislative requirements are met, and employees receive regular information security training to maintain a high level of awareness and compliance.

  • Continuous improvement of the Information Security Management System’s performance.

  • Any breach or suspected weakness in information security is immediately reported, investigated, and addressed.

Tags