Security Policy

Protection of paper information has long-term tradition which lasts for centuries. Rapid growth of work with digital information has fundamentally changed security risk. On one hand, modern information technologies increas efficiency, but on the other hand they also increase the probability that highly important and sensitive information will get into wrong hands or simply disappear when a malfunction or an accident occurs.

The cornerstone of managing hazards associated with intensive usage of today's most valuable resource – information – is identification of clear principles and conditions for their safe and effective use.

The security policy is just the right fundament defining the organizational, personnel and technology action rules for the safety of assets, in particular – information.

Objectives

  • Ensuring confidentiality – assets protection against unauthorized disclosure

  • Ensuring integrity – assets protection against unauthorized or random variations, made to ensure accuracy and completeness of enterprise assets

  • Ensuring availability – assets must be available whenever it is required in accordance with business goals

  • Ensuring non-repundation – ensuring clear identification of the originator of executed transactions or identification of members of communication

  • Work with information must also be in accordance with the applicable laws of the Czech Republic and with contractual obligations which a company have towards its contractors

Benefits

  • Uniform method of handling information – reducing corporation vulnerability to random incidents

  • Rapid recovery from an incident – when an incident occurs, alternative solutions are prepared for an immediate use

  • Learning from errors – according to known procedures, you can identify the causes of the problem very quickly and then take effective measures

Framework

  • Czech legislation

  • internationally recognized standards of ISO/IEC 27001, 27002, 27005