Purpose: The purpose of this policy is to establish and maintain appropriate security measures to protect the confidentiality, integrity, and availability of the company’s information and systems.
Scope: This policy applies to all employees, contractors, and third-party vendors who have access to the company’s information and systems.
Responsibilities:
All employees are responsible for ensuring that their actions do not compromise the security of the company’s information and systems.
The IT department is responsible for implementing and maintaining security controls and monitoring for security breaches.
Management is responsible for ensuring that this policy is followed and that appropriate resources are allocated to maintain the security of the company’s information and systems.
Acceptable Use:
Employees must use company-provided equipment and networks only for company-related business.
Employees must not use company resources to access or distribute inappropriate or illegal content.
Employees must not share login credentials or leave them unsecured.
Security Measures:
The company will implement appropriate security measures to protect its information and systems, such as firewalls, intrusion detection systems, and encryption.
All systems and software must be kept up to date with the latest security patches and updates.
Regular security audits and risk assessments will be conducted to identify potential vulnerabilities.
The company will establish incident response procedures to handle security breaches.
Training and Awareness:
All employees will receive regular training on the proper handling of sensitive information and the importance of cyber security.
Employees will be made aware of the potential risks and how to identify and report security breaches.
[/vc_column_text][/vc_column][/vc_row]
Go HighLevel Onboarding, Training, Education, Coaching, Support, Products and Services. Enabling Customer Success for GHL Agencies Worldwide