Solutions
Security
General Information Security Policy
- Protect the Company’sinformational and IT assets (including but not limited to all computers, mobiledevices, networking equipment, software, and sensitive data) against allinternal, external, deliberate, or accidental threats and to mitigate the risksassociated with the theft, loss, misuse, damage or abuse of these systems;
- Ensure information will be protected against any unauthorized access.Users shall only have access to resources that they have been specificallyauthorized to access. The allocation of privileges shall be strictly controlledand reviewed regularly.
- Protect CONFIDENTIALITY of information. When we talk aboutconfidentiality of information, we are talking about protecting the informationfrom disclosure to unauthorized parties;
- Ensure INTEGRITY of information. Integrity of information refers toprotecting information from being modified by unauthorized parties;
- Maintain AVAILABILITYof information for business processes. Availability of information refers toensuring that authorized parties can access the information when needed.
- Comply with and, wherever possible, exceed, national legislative andregulatory requirements, standards, and best practices;
- Continuously improve the Informationsecurity management system by implementing corrective actions that improve itseffectiveness;
- Develop, Maintain and Test business continuity plans to ensure we stayon course despite all obstacles that we may come across. It is about “keepingcalm and carrying on!”;
- Raise awareness of information security by making information securitytraining available for all Employees. Security awareness and targeted trainingshall be conducted consistently, security responsibilities reflected in jobdescriptions, and compliance with security requirements shall be expected andaccepted as a part of our culture;
- Ensure that no action will be taken against any employee who disclosesan information security concern through reporting or in direct contact withInformation Security Management Leader, unless such disclosure indicates,beyond any reasonable doubt, an illegal act, gross negligence, or a repetitivedeliberate or willful disregard for regulations or procedures;
- Reportall actual or suspected information security breaches to security@paybix.eu.