PROTECTION & SECURITY
|
IBCOM'S INFORMATION SECURITY POLICY | ||||||||||||||
Management has committed to the integration of information security into all areas of the business, to the level of globally acceptable standards. We are committed to the care of our information security assets in the sense of their integrity, confidentiality and availability. Our aim is also to permanently keep and maintain the achieved level of the information security, along with continual improvement. Our information security commitment, is to all areas of the business, including but not limited to: Business operations , cloud based SAAS product development, business and system architecture, Operating Model, HR policies, IT security policies , employment agreements , systems and cloud security, director policy for role based security and administrative privileges, cloud service provider internal compliance and certifications, client/user engagement, project and software lifecycles & governance. An Information Security Management Reference (ISMS)* reference document has been created to define the purpose, scope, direction, principles and basic rules for our information security. The ISMS is available for review by all IbCom employees and any interested parties. The confidentiality, integrity, protection and availability of ibCom’s information assets should always be preserved, whatever the form of the information and however it is shared, utilised, communicated or stored. The ISMS is based on the ISO 27001, 27017 Information Security standards. |
||||||||||||||
KEY ITEMS RELATING TO MYDIGITALSTRUCTURE.CLOUD |
||||||||||||||
|
||||||||||||||
SOME SPECIFICS |
||||||||||||||
|
Protection & Security |
FAQs |
ISMS |
Biological Risks |
Testing |
Continuity |
ISO27001/17 Certification |
ISO 27001/17 Statement of Applicability |