General information security policy
Protection of the Information and IT resources of aumico AG (including, but not limited to, all computers, mobile devices, network equipment, software and sensitive data) from all internal, external, intentional or accidental threats and mitigate the risks associated with theft, loss, misuse, damage or abuse of these systems;
Ensure that the information is protected from unauthorized access. Users may only access the resources for which they have special access authorization. The allocation of privileges must be strictly controlled and regularly reviewed.
Protection of the CONFIDENTIALITY of information. When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorized persons;
Ensuring the INTEGRITY of information. The integrity of information refers to the protection of information against changes by unauthorized persons;
Maintaining the AVAILABILITY of information for business processes. Availability of information refers to ensuring that authorized parties can access the information when needed.
compliance and, wherever possible, exceeding national legal and regulatory requirements, standards and best practices;
Development, maintenance and review business continuity plans to ensure we stay on course despite any obstacles we may encounter. It's about "keeping calm and carrying on";
Raising awareness of information security by providing information security training to all employees. Security awareness and targeted training must be consistent, responsibility for security must be reflected in job descriptions, and compliance with security requirements must be expected and accepted as part of our culture;
Ensure that no action is taken against any employee who discloses information security concerns by reporting or in direct contact with the Head of Information Security Management, unless such disclosure clearly indicates an illegal act, gross negligence or a repeated, willful or deliberate disregard of regulations or procedures.
Reporting all actual or suspected breaches of information security to security@aumico.io.
All translations of this text were created automatically.