List of active policies

Name Type User consent
DATA PROTECTION POLICY Site policy All users
PASSWORD POLICY Site policy All users
INFORMATION SECURITY POLICY Site policy All users

Summary

DATA PROTECTION POLICY

Full policy

Data Protection Policy

1.             Introduction 

1.     Overview 

·         Where we refer to “process”, it means how we collect, use, store, make available, destroy, update, disclose, or otherwise deal with personal information. As a general rule we will only process this personal information if it is required to deliver or offer a service, provide a product, carry out a transaction or obligation in a contract.  

·         We may combine this personal information and use the combined personal information for any of the purposes stated in this Privacy Policy.  

·         If you use our other services, goods, products, and service channels you agree that we may process this personal information as explained under this Privacy Policy. Sometimes you may provide us with consent to process this personal information.  

·         The Company is a global organisation and as such this Privacy Policy will apply to the processing of personal information by any member of The Company globally. If The Company processes personal information for another party under a contract or a mandate, the other party’s privacy policy will apply to the processing of such information.  

·         The Company can change this Privacy Policy from time to time if the law or our business practices requires such change.  

·         This policy establishes a general standard for the appropriate protection of personal information (POPI) within the The Company environment furthermore, it provides principles regarding the rights of individuals to privacy and to reasonable safeguards of their personal information. 

2.     Scope 

All employees, contractors, consultants, temporary and other workers at The Company, including all personnel affiliated with third parties must adhere to this policy. This policy applies to information assets owned or leased by The Company, or to devices that connect to a Company network or reside at a Company site. 

 

2.             Policy Statement 

1.     What is personal information?  

Personal information refers to any information that identifies you or specifically relates to you, or your employees stored or processed on The Product/s. Personal information includes, but is not limited to, the following information about you and / or your employees:  

·         Marital status 

·         National origin 

·         Age 

·         Language 

·         Birthplace 

·         Education 

·         Relevant financial history 

·         Identifying number (like an employee number, identity number or passport number) 

·         E-mail address; physical address (like residential address, work address or your physical location); telephone number 

·         Biometric information (like fingerprints, signature, or voice) 

·         Race; gender; sex; pregnancy status; ethnic origin; social origin; colour; sexual orientation 

·         Physical health; mental health; well-being; disability; religion; belief; conscience; culture 

·         Medical history; criminal history; employment history 

·         Personal views, preferences, and opinions 

·         Another’s views or opinions about you. 

·         Full names and initials 

 

Personal information includes special personal information, as explained below.  

 

2.     When will we process your personal information?  

We will only process this personal information for lawful purposes relating to our business if the following applies: 

·         If you have consented thereto 

·         If a person legally authorised by you, the law, or a court, has consented thereto. 

·         If it is necessary to conclude or perform under a contract, we have with you 

·         If the law requires or permits it 

·         If it is required to protect or pursue yourour or a third party’s legitimate interest. 

 

3.     What is special personal information?  

Special personal information is personal information about the following:  

·         Race (like where a company submits reports to the Department of Labour where the statistical information must be recorded) 

·         Ethnic origin 

·         Trade union membership 

·         Health (like where you apply for an insurance policy) 

·         Biometric information (like to verify your identity); and / or your criminal behaviour and alleged commission of an offense.  

 

4.     When will we process your special personal information?  

We may process your special personal information in the following circumstances:  

·         If you have consented to the processing 

·         If the information is being used for any Human Resource or payroll related requirement 

·         If the processing is needed to create, use or protect a right or obligation in law.  

·         If the processing is for statistical or research purposes and all legal conditions are met 

·         If the special personal information was made public by you 

·         If the processing is required by law 

 

5.     When and from where we obtain personal information about you  

·         We collect personal information from you directly.  

·         We may collect personal information from a public record or if you have deliberately made the information public. 

·         We collect personal information from 3rd parties that are directly integrated with our software platform.  

·         We collect information about you based on your use of our products, services, or service channels. 

·         We collect information about you based on how you engage or interact with us such as via emails, letters, telephone calls and surveys. 

·         We collect personal information from completed forms i.e., contact and billing information. 

If the law requires us to do so, we will ask for your consent before collecting personal information.  

The third parties from whom we may collect your personal information include, but are not limited to, the following:  

·         Our partners, your employer, employees directly, any of our other Bureau or channel partners and any connected companies, subsidiary companies, its associates, cessionaries, delegates, assigns, affiliates or successors in title and / or appointed third parties (like its authorised agents, partners, contractors, and suppliers) for any of the purposes identified in this Privacy Policy.  

·         your spouse, dependents, partners, employer, and other similar sources.  

·         people you have authorised to share your personal information, like a person that makes a travel booking on your behalf or a medical practitioner for insurance purposes.  

·         attorneys, tracing agents, debt collectors and other persons that assist with the enforcement of agreements.  

·         payment processing services providers, merchants, banks, and other persons that assist with the processing of your payment instructions, like EFT transaction partners. 

·         insurers, brokers, other financial institutions, or other organisations that assist with insurance and assurance underwriting, the providing of insurance and assurance policies and products, the assessment of insurance and assurance claims and other related purposes.  

·         law enforcement and fraud prevention agencies and other persons tasked with the prevention and prosecution of crime.  

·         regulatory authorities, industry ombudsman, governmental departments, local and international tax authorities.  

·         trustees, Executors or Curators appointed by a court of law.  

·         our service providers, agents and sub-contractors like couriers and other persons we use to offer and provide products and services to you.  

·         courts of law or tribunals.  

 

6.     Reasons we need to process your personal information.  

We will process your personal information for the following reasons:  

·         to provide you with products, goods and services;  

·         to market our products, goods, and services to you.  

·         to respond to your enquiries and complaints.  

·         to comply with legislative, regulatory, risk and compliance requirements (including directives, sanctions, and rules), voluntary and involuntary codes of conduct and industry agreements or to fulfil reporting requirements and information requests. 

·         to conduct market and behavioural research, including scoring and analysis to determine if you qualify for products and services or to determine your credit or insurance risk;  

·         to develop, test and improve products and services for you;  

·         for historical, statistical and research purposes, like market segmentation.  

·         to process payment instruments. 

·         to create, manufacture and print payment advice; 

·         to enable us to deliver goods, documents or notices to you;  

·         for security, identity verification and to check the accuracy of your personal information;  

·         to communicate with you and carry out your instructions and requests.  

·         for customer satisfaction surveys, promotional offerings. 

·         to enable you to take part in and make use of value-added products and services.  

·         to assess our lending and insurance risks; and / or  

·         for any other related purposes.  

 

7.       How we use your personal information for marketing purposes  

·         We will use your personal information to market our services, related products, and services to you. 

·         We may also market non-banking or non-financial products, goods, or services to you. 

·         We will do this in person, by post, telephone, or electronic channels such as SMS, email, and fax.  

·         If you are not our customer, or in any other instances where the law requires, we will only market to you by electronic communications with your consent. 

·         In all cases you can request us to stop sending marketing communications to you at any time 

8.     When how and with whom we share your personal information  

In general, we will only share your personal information if any one or more of the following apply:  

·         If you have consented to this  

·         If it is necessary to conclude or perform under a contract, we have with you  

·         If the law requires it; and / or  

·         If it’s necessary to protect or pursue your, our or a third party’s legitimate interests.  

 

Where required, each member of the company may share your personal information with the following persons. These persons have an obligation to keep your personal information secure and confidential. 

 

·         Other members of The Company, its associates, cessionary, delegates, assigns, affiliates or successors in title and / or appointed third parties (like its authorised agents, partners, contractors, and suppliers) for any of the purposes identified in this Privacy Policy.  

·         Our employees as required by their employment conditions. 

·         Attorneys, tracing agents, debt collectors and other persons that assist with the enforcement of agreements.  

·         Payment processing services providers, merchants, banks, and other persons that assist with the processing of your payment instructions, like 3rd party EFT service providers. 

·         Law enforcement and fraud prevention agencies and other persons tasked with the prevention and prosecution of crime.  

·         Regulatory authorities, industry ombudsmen, governmental departments, local and international tax authorities, and other persons the law requires us to share your personal information with 

·         Our service providers, agents and sub-contractors like couriers and other persons we use to offer and provide products and services to you 

·         Persons to whom we have ceded our rights or delegated our obligations to under agreements, like where a business is sold 

·         Courts of law or tribunals that require the personal information to adjudicate referrals, actions or applications.  

·         Trustees, Executors or Curators appointed by a court of law 

·         Participating partners in our customer loyalty reward programmes, where you purchase goods, products and service or spend loyalty rewards; and / or our joint venture and other partners with whom we have concluded business agreements, for your benefit. 

 

9.     Under what circumstances will we transfer your information to other countries?  

We will only transfer your personal information to third parties in another country in any one or more of the following circumstances:  

·         Where your personal information will be adequately protected under the other country’s laws or an agreement with the third-party recipient 

·         Where the transfer is necessary to enter into or perform under a contract with you, or a contract with a third party that is in your interest. 

·         Where you have consented to the transfer; and / or  

·         Where it is not reasonably practical to obtain your consent, the transfer is in your interest. 

This transfer will happen within the requirements and safeguards of the law. Where possible, the party processing your personal information in the other country will agree to apply the same level of protection as available by law in your country or if the other country’s laws provide better protection the other country’s laws would be agreed to and applied.  

 

An example of us transferring your personal information to another country is where foreign payments take place if you purchase goods or services in a foreign country, or request that we facilitate salary payments to your employees in the countries.  

 

10.  Your duties and rights about the personal information we have about you  

You must provide proof of identity when enforcing the rights below.  

You must inform us when your personal information changes.  

Please refer to our Promotion of Access to Information Act 2 of 2000 Manual (PAIA Manual) for further information on how you can give effect to the rights listed below.  

You have the right to request access to the personal information we have about you by contacting us. This includes requesting:  

·         Confirmation that we hold your personal information. 

·         A copy or description of the record containing your personal information; and 

·         The identity or categories of third parties who have had access to your personal information. 

 

We will attend to requests for access to personal information within a reasonable time. You may be required to pay a reasonable fee to receive copies or descriptions of records, or information about third parties. We will inform you of the fee before attending to your request.  

 

Please note that the law may limit your right to access information.  

 

You have the right to request us to correct or delete the personal information we have about you if it is inaccurate, irrelevant, excessive, out of date, incomplete, misleading, obtained unlawfully or we are no longer authorised to keep it. You must inform us of your request in writing. Please refer to our PAIA Manual for further information in this regard, like the process you should follow to give effect to this right. It may take up to 15 business days for the change to reflect on our systems. We may request documents from you to verify the change in personal information.  

 

A specific agreement that you have entered with us may determine how you must change your personal information provided at the time when you entered into the specific agreement. Please adhere to these requirements. If the law requires us to keep the personal information, it will not be deleted upon your request. The deletion of certain personal information may lead to the termination of your relationship with us.  

 

You may object on reasonable grounds to the processing of your personal information.  

We will not be able to give effect to your objection if the processing of your personal information was and is permitted by law; you have provided consent to the processing and our processing done according to your consent or the processing is necessary to conclude or perform under a contract with you.  

 

You must inform us of any objection in writing. Please refer to our PAIA Manual for further information in this regard, like the process you should follow to give effect to this right. 

 

Where you have provided your consent for the processing of your personal information, you may withdraw your consent. If you withdraw your consent, we will explain the consequences to youWe may proceed to process your personal information even if you have withdrawn your consent if the law permits or requires it. It may take up to 15 business days for the change to reflect on our systems, during this time we may still process your personal information.  

You have a right to file a complaint with us or any Regulator with jurisdiction about an alleged contravention of the protection of your personal information by us. We will address your complaint as far as possible.  

 

11.  How we secure your personal information  

We will take appropriate and reasonable technical and organisational steps to protect your personal information according to industry best practices. Our security measures (including physical, technological, and procedural safeguards) will be appropriate and reasonable. This includes the following:  

·         Keeping our systems secure (like monitoring access and usage) 

·         Storing our records securely 

·         Controlling the access to our buildings, systems and/or records; and  

·         Safely destroying or deleting records 

·         Ensure compliance with international security standards. 

 

12.  How long do we keep your personal information?  

We will keep your personal information for as long as:  

·         The law requires us to keep it 

·         A contract between you and us requires us to keep it 

·         You have consented to us keeping it 

·         We are required to keep it to achieve the purposes listed in this Privacy Policy. 

·         We require it for statistical or research purposes. 

·         A code of conduct requires us to keep it; and / or  

·         We require it for our lawful business purposes. 

Note: We may keep your personal information even if you no longer have a relationship with us, for the historical data that may be required by your employer or employee.  

 

13.  Children's Privacy 

Our Service does not address anyone under the age of 13. We do not knowingly collect personally identifiable information from anyone under the age of 13. If You are a parent or guardian and You are aware that Your child has provided The Company with Personal Data, please contact Us. If We become aware that We have collected Personal Data from anyone under the age of 13 without verification of parental consent, we take steps to remove that information from Our servers. 

 

If We need to rely on consent as a legal basis for processing Your information and Your country requires consent from a parent, we may require Your parent's consent before We collect and use that information. 

 

14.  Our cookie policy  

A cookie is a small piece of data sent from our websites or applications to your computer or device hard drive or Internet browser where it is saved. The cookie contains information to personalise your experience on our websites or applications and may improve your experience on the websites or applications. The cookie will also identify your device, like the computer or smart phone.  

 

By using our websites or applications you agree that cookies may be forwarded from the relevant website or application to your computer or device. The cookie will enable us to know that you have visited the website or application before and will identify youWe may also use the cookie to prevent fraud and for analytics.

 

1.    References  

Document Name 

Information Classification Policy 

PAIA Manual

 

 

 

 

 

2.    Outputs 

The following records need to be kept and stored securely. 

Record 

Responsible Person 

Retention 

Disposition  

 

 

 

 

 

 

 

 

 

 

 

 

 

All records must be stored in the pre-allocation location. All physical copies need to be stored in a lockable cabinet or drawer. 

 

3.    Enforcement 

 

An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. A violation of this policy by a temporary worker, contractor, or vendor may result in the termination of their contract or assignment with The Company.

 

Any exception to the policy must comply with the Exceptions Policy 



Summary

PASSWORD POLICY

Full policy

Password Policy

1.             Introduction 

1.     Overview 

Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of The Company resources. All users, including contractors and vendors with access to The Company systems, are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords. 

 

2.     Scope 

All employees, contractors, consultants, temporary and other workers at The Company including all personnel affiliated with third parties must adhere to this policy. This policy applies to information assets owned or leased by The Company, or to devices or services that connect to a The Company network or reside at a Company Site.

 

2.             Policy Statement 

1.    Password Creation 

1.     All user-level and system-level passwords must conform to the “Password Construction Guidelines” set out in clause 2.5 of this document.  

2.     Users should not use the same password for The Company accounts as for other personal or other access (for example, personal ISP account, Internet Banking, social media accounts, etc.).  

3.     Where possible, users should not re-use the same password for various The Company access needs. 

 

2.    Password Change 

1.     All user-level passwords must be changed at least every sixty calendar days.  

2.     Password cracking or guessing may be performed on a periodic or random basis by the The Company IT Team or The Company security team or its delegates. If a password is guessed or cracked during one of these scans, the user will be required to change it to comply with this policy. 

 

3.    Password Protection 

1.     Refrain from sending plaintext passwords over networks or email, it could compromise security. Passwords sent in plain text can be read by anyone.  

2.     Passwords must not be shared with anyone. All passwords are to be treated as restricted The Company information.  

3.     Passwords may be inserted into email messages, Alliance cases or other forms of electronic communication, but must be encrypted and the encryption key must be shared via a different media source. Refer to the Acceptable Encryption Policy.  

4.     Do not reveal a password on questionnaires or security forms.  

5.     Do not hint at the format of a password (for example, "my family name").  

6.     Do not share The Company passwords with anyone, including administrative assistants, secretaries, managers, co-workers, and family members.  

7.     Do not write passwords down and store them anywhere in your workspace.   

8.     Do not store passwords in a file on a computer system or mobile devices (phone, tablet)   

9.     Do not use the "Remember Password" feature of applications (for example, web browsers).  

10.  Any user suspecting that his/her password may have been compromised must report the incident to the The Company IT department immediately and request a change of passwords on all user access accounts.  

11.  Password managers can be used, users must refer to the pre-authorised software list, held by InfoSec and IT departments. 

 

4.    Application Development 

Application developers must ensure that their programs contain the following security precautions:  

1.     Applications must support the authentication of individual users.  

2.     Applications that authenticate against Active directory must authenticate against a dedicated Active Directory security group.  

3.     Applications must not store passwords in clear text or in any easily reversible form.  

4.     Applications must not transmit passwords in clear text over the network.  

5.     Applications must provide for some sort of role management, such that one user can take over the functions of another without having to know the other's password. 

 

5.    Password Construction Guidelines  

Passphrases are not the same as passwords. A passphrase is a longer version of a password and is, therefore, more secure. A passphrase is typically composed of multiple words. Because of this, a passphrase is more secure against "dictionary attacks".  

 

A good passphrase is relatively long and contains a combination of upper and lowercase letters, numeric and punctuation characters.   

  

Passwords that are listed in the password blacklist will not be available for use.   

 

The Company Passwords must meet three of the four characteristics below:  

·       Contain at least 12 alphanumeric characters. 

·       Contain both upper- and lower-case letters. 

·       Contain at least one number (for example, 0-9). 

·       Contain at least one special character (for example,$%^&*()_+|~-­‐=\`{}[]:";'<>?,/). 

 

6.    Password Examples 

BAD Examples 

·         A password containing a single dictionary word (for example, Password). 

·         Contains personal information (for Example, Birth Date, Birth Year, Family Names, Pet Names). 

·         Contain work-related information such as building names, system commands, sites, companies, hardware, or software. 

·         Contain number patterns such as aaabbb, qwerty, zyxwvuts, or 123321. 

·         Contain a common word spelled backwards, preceded, or followed by a number (for example, terces, secret1 or 1secret). 

·         Some variation of “Welcome123” “Password123” “Changeme123”. 

 

7.    Administrator Enforced Policies 

All The Company systems administrators are responsible for ensuring that the network environment and all Operating Systems within the Company network are configured to support this password policy. The following configuration settings must be applied to all Active Directory Forests, Active Directory Domains, Windows member servers and Non‐Windows servers which operate within any of the Company owned networks. 

1.     Enforce Password History – This must be set to 10 passwords remembered, i.e.: The user may not be able to use his/her previous 10 passwords. 

2.     Maximum Password Age – This must be set to 60 calendar days, so that the system enforces the change of the user’s password every 60 calendar days. 

3.     Minimum Password Age – This must be set to 10 calendar days, so that users can only change their passwords at will every 10 calendar days. 

4.     Minimum Password Length – This must be set to 12 characters. 

5.     Password Complexity – Must be enabled to ensure that passwords are case sensitive, alpha-numeric and contain special characters. 

6.     Account Lockout Duration – Lockout duration should be set to 30 minutes.  

7.     Account Lockout Threshold – Lockout Threshold should be set to 5 bad consecutive password attempts. 

8.     Reset Account Lockout Counter – Reset Account Lockout Counter should be set to 30 minutes. 

9.     IT Administrators need to update the password blacklist annually. The blacklist needs to be recorded, approved, and communicated by the IT manager. 

 

8.    SuperUser / Administrator Passwords 

A Super User / Administrator account is a highly sensitive account and extreme caution should be taken when dealing with these accounts. 

1.     Superuser or Administrator passwords should never be shared with anyone inside or outside the organization.  

2.     All Administrators will be issued with a named Administrator account. Named administrator accounts will reflect the name of the person responsible for that specific account. The user will be responsible for their Administrator account and the safekeeping of the account password.  

3.     All Administrators will be held responsible for the activities on their set account.  

4.     All Administrator accounts must be enrolled, if supported by the system, with MFA Multi-Factor Authentication, the preference of the MFA options is, in order: 

1.             Authentication App 

2.             Phone Call 

3.             Alternate Email address 

4.             SMS 

 

9.    Default Administrator Passwords 

1.     The default Administrator account usernames must be changed, where possible.  

2.     The default Administrator account password must be changed during the implementation of the system. 

3.     The passwords for the default administrator account should only be accessible to authorized personnel.  

4.     Passwords for Default Administrator accounts will be changed annually and must be documented within the Access control framework document and stored in a secure location, this document should not be saved on any system within the company network. 

5.     Passwords for default Administrator accounts should comply with the below rules, where applicable: 

a.     Minimum Password Length – This must be set to 20 characters. 

b.     Password Complexity – Must be enabled to ensure that passwords are case sensitive, alpha-numeric and contain special characters. 

 

10. Local Administrator Passwords 

The "Local Administrator Password Solution" (LAPS) provides the management of local account passwords of domain-joined computers. Passwords are stored in Active Directory and protected by ACL, so only eligible users can read it or request its reset. 

1.     Users who are eligible to read the local administrator passwords are responsible for the safekeeping of the passwords. 

2.     Local Administrator passwords must not be shared with any unauthorized person.  

3.     Local Administrator passwords must be changed every 90 days. 

4.     LAPS must be enrolled on all domain-joined devices. 

 

11. Mobile Phone Passwords 

Mobile phones that are used to access company information must comply with the Minimum Access Policy and must have a password set and must comply with the below: 

1.     Minimum Password Length – This must be set to 5 characters. 

2.     Password Complexity – Complex numeric, repeated, or consecutive numbers, such as "1111" or "1234", aren't allowed. 

3.     Maximum minutes of inactivity before a password is required – 5 minutes. 

 

12. Password Managers 

The use of password managers has become more common, and the use of password managers is accepted within the environment, but must comply with the following: 

1.     Password Managers need to be enrolled with your company-issued email address.  

2.     Storing company passwords on a Password Managers enrolled with a personal email address is strictly prohibited. 

3.     Multi-factor authentication must be enabled on the account. 

4.     These accounts should never be shared with other internal or external parties.  

5.     Individual Passwords may be shared through the Password Manager application and must be controlled through the Password Manager Application. 

6.     Shared Passwords must be reviewed on a regular basis. 

7.     The use of a password generator is allowed, but the password must meet the password requirements specified in section 2.5 of this document. 

 

3.             References  

Document Name 

Exceptions Policy 

Information Classification Policy 

 

 

 

 

 

 

4.             Outputs 

The following records need to be kept and stored securely. 

Record 

Responsible Person 

Retention 

Disposition  

Password Document 

IT Manager 

5 Years 

Delete / Shred 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

All records must be stored in the pre-allocation location. All physical copies need to be stored in a lockable cabinet or drawer. 

 

5.             Enforcement 

 An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. A violation of this policy by a temporary worker, contractor or vendor may result in the termination of their contract or assignment with The Company.

 

Any exception to the policy must comply with the Exceptions Policy 

 

6.             Definitions  

TERMS 

DESCRIPTION 

Dictionary attacks 

An attempt to gain illicit access to a computer system by using a very large set of words to generate potential passwords. 

Local Administrator Password Solution (LAPS) 

For environments in which users are required to log on to computers without domain credentials, password management can become a complex issue. Such environments greatly increase the risk of a Pass-the-Hash (PtH) credential replay attack. The Local Administrator Password Solution (LAPS) provides a solution to this issue of using a common local account with an identical password on every computer in a domain. LAPS resolves this issue by setting a different, random password for the common local administrator account on every computer in the domain. Domain administrators using the solution can determine which users, such as helpdesk administrators, are authorized to read passwords. 

SuperUser / Administrator 

A user of a computer system with special privileges needed to administer and maintain the system 



Summary

INFORMATION SECURITY POLICY

Full policy

Information Security Policy


Purpose 

The purpose of the Information Security Framework is: 

·         To establish an approach to information security. 

·         To detect and protect against the compromise of information security such as misuse of data (physical and electronic), networks, computer systems and applications. 

·         To protect the reputation of the company concerning its ethical and legal responsibilities. 

·         To observe the rights and protect the privacy of our customers.  

The Company is fully committed to ensuring the Confidentiality, Integrity and Availability of the data entrusted to us by our clients and partners. 

Information Security Policy  

The Company recognises the disciplines of confidentiality, integrity and availability in Information Security Management are integral parts of its management function. The management of The Company these as primary responsibilities and fundamental to the best business practice of adopting appropriate Information Security Controls.

The Company Information Security policy seeks to operate to the highest standards continuously and to focus on continual improvement through annual review.  

We will:  

·         Comply with all the applicable laws, regulations, and contractual obligations.  

·         Implement continual improvement initiatives, including risk assessment and risk treatment strategies, while making the best use of its management resources to better Information Security requirements.  

·         Communicate our Information Security objectives, and its performance in achieving these objectives, throughout the organization and to interested parties.  

·         Adopt an Information Security Management System comprising organizational policies and procedures which provide direction and guidance on information security matters relating to employees, customers, suppliers and interested parties who come into contact with its work.  

·         Work closely with our customers, business partners and suppliers in seeking to establish appropriate Information Security standards.  

·         Adopt a forward-looking view on future business decisions, including the continual review of risk evaluation criteria, which may have an impact on Information Security.  

·         Train all members of staff in the needs and responsibilities of Information Security Management.  

·         Constantly strive to meet, and where possible exceed, our customer’s, staff, and partners expectations.  

Responsibility is for upholding this policy is truly organization-wide under the guidance and with the assistance of the CEO who encourages the personal commitment of all staff to address Information Security as part of their skills.