Information Security Policies

Acceptable Use Policy

Information Security Policies

This policy applies to all users of the company's computing resources such as networks, applications, including all company owned, licensed, or managed hardware (end user devices such as computers) and software. Information, communications and technology resources are made available to the company's officers and employees, including its affiliates, to facilitate its mission, in accordance to its core values, aligned to the principles, goals, and ideals described in its Vision Statement. Therefore, the purpose of this policy is to outline the standards for the acceptable uses of information, communications and technology resources.

Anti-Virus Policy

Information Security Policies

This policy applies to all computers connected to the company network. The definition of computers includes desktop workstations, laptop computers, handheld computing devices, and servers. Viruses can be transmitted via e-mail or instant messaging (IM) attachments, including, but is not limited to, downloadable internet files, diskettes, USBs, and CDs. The aim of this policy is to provide a computing network that is virus-free. This policy, therefore, is designed to protect 's resources against intrusion by viruses and other malware, and to eventually prevent major and widespread damage to user applications, files, and hardware.

Cellular Phone Issuance and Accountability Policy

Information Security Policies

This policy applies to all cellular phones bought and owned by the company, whether it is for a pre-paid account or post-paid account, for issuance to its officers and employees. The purpose of this policy is to establish guidelines on all cellular/mobile phone issuances to officers and employees, in accordance to their assigned tasks, aligned to their job duties and responsibilities.

Electronic Mail (Email) Policy

Information Security Policies

This policy applies to all email resources owned, managed and provided by . It also applies to all users and their appropriate use of the email resources. Further, this also applies to all email records of employee-users, vendors and other authorized users of the company’s email system. The purpose of this policy is to provide electronic mail (email) services to all officers and authorized employees, including affiliates, in support of the mission of the company and the functions to carry out that mission.

Password Protection Policy

Information Security Policies

The scope of this policy includes all authorized company officers and employees who have or are responsible for an account or any form of access that supports or requires a password on any system or IT infrastructure, such as computers, servers, routers, firewalls, electronic communications and other electronic devices that requires access codes and/or passwords. Passwords are an essential aspect of our computer security program. Passwords are the front line of protection for user accounts. A poorly chosen password may result in the compromise of the company's critical resources. The purpose of this policy is to set a standard for creating, protecting, and changing passwords such that they are strong, secure, and protected.

Software Compliance Policy

Information Security Policies

This policy applies to all officers and employees of the company who are accountable for the purchase, inventory, issuance and use of licensed software. This policy is all about best practices for lawfully proper and efficient software management, purpose of which is to 1) encourage the lawful use of copyright-protected materials; 2) respect the rights of ownership of intellectual property; and 3) protect the company against risk of copyright infringement.