INFORMATION SECURITY MANAGEMENT
We wish to protect the confidentiality, integrity, and availability of information under the application of Risk Management.
For this reason, we commit ourselves:
For this reason, we commit ourselves:
- To meet applicable requirements such as applicable laws and regulatory stipulations towards the stakeholders;
- To ensure the availability of necessary resources;
- To define, control, monitor, and maintain permanently the information security throughout our enterprises;
- To continually improve ISMS;
- To repeatedly assess information security risks;
- To identify, analyze and evaluate information security risks;
- To adapt to current needs;
- To prepare for disturbances, outages, and security incidents.