Information Security Policy
1. Introduction
Geviton is committed to protecting the confidentiality, integrity, and availability of its information assets. This Information Security Policy outlines the company's approach to information security and the responsibilities of employees.
2. Scope
This policy applies to all Geviton employees, contractors, and third-party vendors who have access to Geviton's information assets. Information assets include any data, information, or systems that are owned or used by Geviton.
3. Information Security Principles
Geviton adheres to the following information security principles:
-
Confidentiality: Information should only be accessed by authorized personnel.
-
Integrity: Information should be accurate and complete.
-
Availability: Information and systems should be available when needed.
4. Security Controls
Geviton implements a variety of security controls to protect its information assets. These controls include:
-
Access controls: User accounts and access permissions are granted based on the principle of least privilege.
-
Data security: Sensitive data is encrypted at rest and in transit.
-
Network security: Firewalls and intrusion detection systems are used to protect Geviton's network from unauthorized access.
-
Change management: A formal change management process is used to manage changes to systems and data.
-
Incident response: Geviton has a process for identifying, responding to, and recovering from security incidents.
5. Employee Responsibilities
All Geviton employees are responsible for protecting the company's information assets. Employees must:
-
Use strong passwords and change them regularly.
-
Be aware of phishing and social engineering scams.
-
Report suspicious activity to the IT department.
-
Only access information and systems they are authorized to access.
6. Training and Awareness
Geviton provides regular training and awareness programs to employees on information security best practices.
7. Review and Update
This Information Security Policy will be reviewed and updated on a regular basis to reflect changes in the company's business environment and the threat landscape.
8. Contact
For any questions about this Information Security Policy, please contact the IT department.
No comments to display
No comments to display