Security Policy

 

In response to a new technological environment where convergence between information technology and communications is facilitating a new productivity paradigm for companies, IT-Decision Telecom, is highly committed to maintaining a competitive service through offering a responsible business model based on the permanent search for economic, social and environmental balance, where the development of good practices in Information Security is essential to achieve the objectives of confidentiality, integrity, availability and legality of all managed information.


 

Consequently, IT-Decision Telecom defines the following principles of application to be taken into account in the framework of the Information Security Management System (ISMS):


 

  • Confidentiality: The information processed by IT-Decision Telecom will be known exclusively by authorized persons, upon identification, at the time and by the authorized means.
     

  • Integrity: The information processed by IT-Decision Telecom will be complete, accurate and valid, its content being provided by those affected without any manipulation.
     

  • Availability: The information processed by IT-Decision Telecom will be accessible and usable by authorized and identified users at all times, ensuring its own persistence in the event of any anticipated eventuality.
     

  • Legality: IT-Decision Telecom, will guarantee compliance with all applicable legislation or contractual requirement. And specifically, the regulations in force related to the processing of personal data.
     

IT-Decision Telecom for the correct performance of its business functions is based and helps in the treatment of different types of data and information, supported by systems, programs, communications infrastructure, files, databases, files, etc., constituting these , one of the main assets of IT-Decision Telecom, in such a way that their damage or loss affects the performance of their services and can jeopardize the continuity of the organization. So that this does not happen, an Information Security Policy has been designed whose main purposes are:


 

  • To protect, through controls / measures, assets against threats that may result in security incidents.
     

  • Palliate the effects of security incidents.
     

  • Establish a system of classification of information and data in order to protect critical information assets.
     

  • Define the responsibilities in matters of information security generating the corresponding organizational structure.
     

  • To elaborate a set of rules, standards and procedures applicable to management bodies, employees, partners, external service providers, etc.
     

  • Specify the effects of non-compliance with the Safety Policy in the workplace.
     

  • Evaluate the risks which affect the assets in order to adopt the appropriate security measures / controls.
     

  • Verify the operation of the security measures / controls of the Safety Policy in the workplace.
     

  • Train users in security management and in information and communications technologies.
     

  • Control information and data traffic through communications infrastructures or by sending optical, magnetic, paper, etc. data media.
     

  • Observe and comply with the legislation in terms of data protection, intellectual property, labor, information society services, criminal, etc., which affects the assets of IT-Decision Telecom.
     

  • Protect the intellectual capital of the organization so that it is not disclosed or used illegally.
     

  • Reduce the possibilities of unavailability through the proper use of the organization’s assets.
     

  • Defend the assets before internal or external attacks so that they do not become security incidents.
     

  • Check the operation of security measures finding out the number of incidents, their nature and effects.
     

The Management of IT-Decision Telecom assumes responsibility for supporting and promoting the establishment of the necessary organizational, technical and control measures to comply with this Information Security Policy. As well as, to provide those resources that are necessary to resolve as quickly and efficiently as possible, the nonconformities and incidents of information security that may arise, and the implementation of the necessary measures so that they do not return to occur.


 

This Policy will be maintained, updated and appropriate for the purposes of the organization, aligning with the organization’s risk management context. For this purpose it will be reviewed at planned intervals or whenever there are significant changes, in order to ensure that its suitability, adequacy and effectiveness are maintained.


 

Similarly, a formally defined risk assessment procedure is established to manage the risks that IT-Decision Telecom faces.


 

For its part, all policies and procedures included in the ISMS will be reviewed, approved and promoted by the IT-Decision Telecom Management.

5 Tornimae str

10145 Tallinn, Harjumaa, Estonia

Т. +372 602 8478

Т. +38 (044) 561-7171

  • LinkedIn Black Square
  • facebook-square
  • Twitter Square
  • google-plus-square

Copyright © 2011-2020 ITD Telecom LLC

logo_allatra-1.png

PARTNER OF GLOBAL

PARTNERSHIP

AGREEMENT

ALLATRA

Лого-СО_целый_я-поддерживаю-СО_с-плашкой