Skip to main content

Information Security Policy

1. Introduction

Geviton is committed to protecting the confidentiality, integrity, and availability of its information assets. This Information Security Policy outlines the company's approach to information security and the responsibilities of employees.

2. Scope

This policy applies to all Geviton employees, contractors, and third-party vendors who have access to Geviton's information assets. Information assets include any data, information, or systems that are owned or used by Geviton.

3. Information Security Principles

Geviton adheres to the following information security principles:

  • Confidentiality: Information should only be accessed by authorized personnel.

  • Integrity: Information should be accurate and complete.

  • Availability: Information and systems should be available when needed.

4. Security Controls

Geviton implements a variety of security controls to protect its information assets. These controls include:

  • Access controls: User accounts and access permissions are granted based on the principle of least privilege.

  • Data security: Sensitive data is encrypted at rest and in transit.

  • Network security: Firewalls and intrusion detection systems are used to protect Geviton's network from unauthorized access.

  • Change management: A formal change management process is used to manage changes to systems and data.

  • Incident response: Geviton has a process for identifying, responding to, and recovering from security incidents.

5. Employee Responsibilities

All Geviton employees are responsible for protecting the company's information assets. Employees must:

  • Use strong passwords and change them regularly.

  • Be aware of phishing and social engineering scams.

  • Report suspicious activity to the IT department.

  • Only access information and systems they are authorized to access.

6. Training and Awareness

Geviton provides regular training and awareness programs to employees on information security best practices.

7. Review and Update

This Information Security Policy will be reviewed and updated on a regular basis to reflect changes in the company's business environment and the threat landscape.

8. Contact

For any questions about this Information Security Policy, please contact the IT department.