Information Security Policy

An Information Security Policy is a set of guidelines and rules that outline how an organization protects its sensitive and confidential information.

1

Introduction

Sharedpro recognizes the importance of information security and is committed to ensuring the confidentiality, integrity, and availability of all information assets. This policy outlines a framework for setting objectives, supporting commitment to meeting requirements, and continuous improvement to ensure the ongoing effectiveness of our information security program.

2

Objectives

  • Confidentiality: To ensure that confidential information is protected from unauthorized disclosure, access, or use.
  • Integrity: To ensure that information is accurate and complete and that it is protected from unauthorized modification or destruction.
  • Availability: To ensure that information is available to authorized users when required.
  • Compliance: To ensure that all information security policies, standards, laws, and regulations are adhered to.
  • Awareness: To ensure that all employees are aware of their responsibilities and obligations regarding information security.
3

Commitment

Sharedpro management is committed to supporting the information security program and ensuring that all employees and contractors are aware of their responsibilities and obligations. Management will provide the necessary resources to maintain the information security program and ensure that it remains effective.

4

Continuous Improvement

Sharedpro will monitor the effectiveness of the information security program and review it regularly to ensure that it remains up-to-date and effective. The program will be reviewed in light of changes to the business environment, emerging threats, and the changing regulatory landscape.

5

Responsibilities

All employees and contractors are responsible for adhering to the information security policy and procedures. It is their responsibility to report any security incidents or breaches immediately to the appropriate authority.

6

Security Controls

Sharedpro will implement appropriate security controls to protect information assets. These controls will include, but are not limited to:

  • Access Controls: Access to information will be restricted to authorized personnel only, and access will be granted based on a need-to-know basis.
  • Data Protection:: Information will be protected from unauthorized disclosure, modification, or destruction using encryption and other appropriate measures.
  • Network Security: Network infrastructure will be protected using firewalls, intrusion detection and prevention systems, and other appropriate measures.
  • Incident Response: Procedures will be established for detecting, reporting, and responding to security incidents.
  • Physical Security: Physical access to information assets will be restricted using appropriate measures.
7

Conclusion

Sharedpro is committed to information security and recognizes the importance of protecting information assets. This policy outlines a framework for setting objectives, supporting commitment to meeting requirements, and continuous improvement to ensure the ongoing effectiveness of our information security program. All employees and contractors are expected to adhere to this policy and procedures to ensure the confidentiality, integrity, and availability of our information assets.