Cyber Security Policy

  1. Purpose: The purpose of this policy is to establish and maintain appropriate security measures to protect the confidentiality, integrity, and availability of the company’s information and systems.
  2. Scope: This policy applies to all employees, contractors, and third-party vendors who have access to the company’s information and systems.
  3. Responsibilities:
  • All employees are responsible for ensuring that their actions do not compromise the security of the company’s information and systems.
  • The IT department is responsible for implementing and maintaining security controls and monitoring for security breaches.
  • Management is responsible for ensuring that this policy is followed and that appropriate resources are allocated to maintain the security of the company’s information and systems.
  1. Acceptable Use:
  • Employees must use company-provided equipment and networks only for company-related business.
  • Employees must not use company resources to access or distribute inappropriate or illegal content.
  • Employees must not share login credentials or leave them unsecured.
  1. Security Measures:
  • The company will implement appropriate security measures to protect its information and systems, such as firewalls, intrusion detection systems, and encryption.
  • All systems and software must be kept up to date with the latest security patches and updates.
  • Regular security audits and risk assessments will be conducted to identify potential vulnerabilities.
  • The company will establish incident response procedures to handle security breaches.
  1. Training and Awareness:
  • All employees will receive regular training on the proper handling of sensitive information and the importance of cyber security.
  • Employees will be made aware of the potential risks and how to identify and report security breaches.