- We have documented information security policies, as well as risk management policy and procedure. We made it available to all impacted personnel and business partners, authorized by accountable business role/function and supported by the information security management program as per ISO 27001 standard.
- Pursuant to local laws, regulations, ethics, and contractual constraints, all employment candidates, contractors, and involved third parties subject to background verification.
- All employees receive regular information security training and awareness.
- We have a program in place that includes the ability to monitor changes to the regulatory requirements in relevant jurisdictions, adjust the security program for changes to legal requirements, and ensure compliance with relevant regulatory requirements.
- We conduct internal assessments that are thoroughly documented and audited annually by our appointed third-party auditor.
If you can’t find what you need or need further assistance, contact us.
Did you find this article helpful? Yes No