Security Policy
Information Security Policy
Why Information Security Policy Is Necessary
Bollytech’s information security policy aims to:
- As much as possible, make sure that business operations continue as usual.
- Ensure that all information used or stored is reliable and accessible.
- Manage and store information while following proper confidentiality practices
- Protect the organization’s information assets from all threats, whether they come from inside or outside the organization, and whether they are intentional or accidental.
Security Policy Information
The information security policy of Bollytech ensures that:
- Information Accessibility: Information is readily available to staff and the public with minimal disruption.
- Information Classification: Information is classified by protection levels to safeguard sensitive data from unauthorized access and disclosure.
- Regulatory Compliance: The policy meets all applicable business, national, and international legal requirements.
- Training and Awareness: Staff and relevant external parties receive training to understand and implement the policy effectively.
- Information Integrity: The accuracy and completeness of information are maintained, protecting it from unauthorized changes.
- Incident Reporting: A system is in place for reporting and investigating all security breaches.
- Access Control: Appropriate access controls are implemented to prevent unauthorized access to information.
- Business Continuity: Business continuity plans address potential disruptions and protect critical processes from major failures or disasters.