Legistify Services private limited
INFORMATION SECURITY POLICY
Document Name: | INFORMATION SECURITY POLICY |
|
|
Classification: | Internal |
|
|
Document Owner: | CISO/MR- |
|
|
Document Approver: | Top Management |
|
|
Original Document Issue Date: | 10/10/2023 |
|
|
Current Edition: | Version 2.0 |
|
|
Revision History: |
|
|
|
S. No. | Description of Change | Date of Change | Version No. |
1 | Initial Release | 10/10/2023 | 1.0 |
2 | Second Release | 10/10/2024 | 2.0 |
3 |
|
|
|
5 |
|
|
|
6 |
|
|
|
7 |
|
|
|
Purpose of the Policy
This policy provides guidelines for the protection and use of information technology assets and resources within the business to ensure integrity, confidentiality and availability of data and assets.
Procedures
Physical Security
For all servers, mainframes and other network assets, the area must be secured with adequate ventilation and appropriate access through such as keypad, lock, biometric machine etc.
It will be the responsibility of IT Dept. to ensure that this requirement is followed at all times. Any employee becoming aware of a breach to this security requirement is obliged to notify IT Dept. immediately.
All security and safety of all portable technology such as laptop, notepads, iPad, BitLocker Key, iPhone etc. will be the responsibility of the employee who has been issued with the such as laptop, notepads, iPads, mobile phones etc. Each employee is required to use such as locks, passwords, BitLocker etc. and to ensure the asset is kept safely at all times to protect the security of the asset issued to them.
In the event of loss or damage, Management will assess the security measures undertaken to determine if the employee will be required to reimburse the business for the loss or damage.
All laptops, notepads, iPads etc. when kept at the office desk is to be secured by such as keypad, lock, password etc. provided by System Administrator.
Information Security
All relevant data to be backed up – either general such as sensitive, valuable, or critical business data or provide a checklist of all data to be backed up is to be backed-up.
It is the responsibility of System Administrator to ensure that data back-ups are conducted on regular interval as per backup policy and the backed-up data is kept on cloud\ Egnyte.
All technology that has internet access must have anti-virus software installed. It is the responsibility of System Administrator to install all anti-virus software and ensure that this software remains up to date on all technology used by the business.
All information used within the business is to adhere to the privacy laws and the business’s confidentiality requirements. Any employee breaching this will be referred to Management who will review the breach and determine adequate consequences
Technology Access
Every employee will be issued with a unique identification code to access the business technology and will be required to set a password for access every 30 days.
Each password is to be such as number of alpha, one cap letter and numeric etc. and is not to be shared with any employee within the business.
System Administrator is responsible for the issuing of the identification code and initial password for all employees.
Where an employee forgets the password or is ‘locked out’ after three attempts, then System Administrator is authorised to reissue a new initial password that will be required to be changed when the employee logs in using the new initial password.
The following table provides the authorisation of access:
Technology – Hardware/ Software | Persons authorised for providing access |
Email Access on system, mobile etc. | System Administrator |
Share Drive Access | System Administrator |
Internet Access, Specific URL etc. | System Administrator |
Employees are only authorised to use business computers for personal use such as internet usage, mobile etc.
For internet and social media usage, refer to the HR Policies and Procedures.
It is the responsibility of System Administrator to keep all procedures for this policy up to date.
Policy Revision History
Date | Version | Author | Reviewer | Approver | Comments |
10/10/2023 | 0.1 | ISMS Manager | CIO | Legistify Services private limited Management | Draft Version of INFORMATION SECURITY POLICY |
|
|
|
|
|
|
|
|
|
|
|
|