{"id":1605,"date":"2020-08-11T11:46:52","date_gmt":"2020-08-11T11:46:52","guid":{"rendered":"https:\/\/gfg.com.pk\/cccl\/?page_id=1605"},"modified":"2020-08-11T11:46:52","modified_gmt":"2020-08-11T11:46:52","slug":"information-system-security","status":"publish","type":"page","link":"https:\/\/gfg.com.pk\/cccl\/information-system-security\/","title":{"rendered":"Information System Security Policy"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row el_class=&#8221;customeheadingline headingtopmargin&#8221;][vc_column][vc_custom_heading text=&#8221;Information System Security Policy&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23ffffff&#8221; el_id=&#8221;pch&#8221;][vc_separator][\/vc_column][\/vc_row][vc_row el_class=&#8221;policycontent&#8221;][vc_column][vc_column_text]<strong>OBJECTIVE<\/strong><\/p>\n<p>The objective of Information Security is to ensure continuity of business of the company and to minimize business damage by preventing and limiting the impact of security incidents.<\/p>\n<p><strong>POLICY<\/strong><\/p>\n<ol>\n<li>The purpose of the Policy is to protect Company information assets from all threats, whether internal or external, deliberate or accidental. These assets relate to information stored and processed electronically.<\/li>\n<li>It is the Policy of the Company to ensure that:\n<ul style=\"list-style-type: lower-alpha;\">\n<li>Information will be protected against unauthorized access.<\/li>\n<li>Confidentiality of information will be assured by protection from unauthorized disclosure or intelligible interruption.<\/li>\n<li>Integrity of information (its accuracy and completeness) will be maintained by protecting against unauthorized modification.<\/li>\n<li>Regulatory and legislative requirements will be met, including record keeping, according to Information Security Management System standard.<\/li>\n<li>Disaster Recovery Plans will be produced, maintained and tested, to ensure that information and vital services are available to Company when needed.<\/li>\n<li>Information on security matters will be made available to all staff.<\/li>\n<li>All breaches of information security, actual or suspected, will be reported to and investigated by the Information Security Officer \/ Internal Audit.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ol>\n<ol start=\"3\">\n<li>Standards will be produced to support the policy. These standards will include regulations, guidelines and procedures covering matters such as (not limited to) data security, backup, virus control and passwords.<\/li>\n<li>Business requirements for the available of information and information system will be met.<\/li>\n<li>The role and responsibility for managing information security will be assigned to a designated Information Security Officer\/Internal Audit.<\/li>\n<li>The information Security Officer\/Internal Audit will be responsible for maintaining the Policy and providing advice and guidance on its implementation.<\/li>\n<li>All managers are responsible for implementing the Policy within their business areas, and for adherence by their staff.<\/li>\n<li>It is responsibility of each employee to adhere to the Policy.<\/li>\n<\/ol>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=&#8221;customeheadingline headingtopmargin&#8221;][vc_column][vc_custom_heading text=&#8221;Information System Security Policy&#8221; font_container=&#8221;tag:h3|text_align:left|color:%23ffffff&#8221; el_id=&#8221;pch&#8221;][vc_separator][\/vc_column][\/vc_row][vc_row el_class=&#8221;policycontent&#8221;][vc_column][vc_column_text]OBJECTIVE The objective of Information Security is to ensure continuity of business of the company and to<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1605","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gfg.com.pk\/cccl\/wp-json\/wp\/v2\/pages\/1605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gfg.com.pk\/cccl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gfg.com.pk\/cccl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gfg.com.pk\/cccl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gfg.com.pk\/cccl\/wp-json\/wp\/v2\/comments?post=1605"}],"version-history":[{"count":0,"href":"https:\/\/gfg.com.pk\/cccl\/wp-json\/wp\/v2\/pages\/1605\/revisions"}],"wp:attachment":[{"href":"https:\/\/gfg.com.pk\/cccl\/wp-json\/wp\/v2\/media?parent=1605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}