image
Information Security Policy
Information Security Policy

Information security management manual according to ISO 9001:2015 and ISO 27001:2013

Information Security constitutes a top priority for the company to:

  • Ensure the secure provision of services for development, interconnection and software support, consultancy services and management of software development projects and IT and telecommunications educational services,
  • Ensure full compliance of the company with the relevant legal and regulatory requirements,
  • Protect the interests of the company and those who work with it and trust it in the use and circulation of their data,
  • Ensure the availability, integrity and confidentiality of information produced, received and handled within the framework of software development, interconnection and support services, consultancy services and management of software development projects as well as IT and telecommunication education services,
  • Maximize the credibility of the company's information resources.

The implementation of Information Security Policies and Procedures aims at the following:

  • Protection of computing resources and traffic information in the company's services from any threat, whether internal or external, deliberate or accidental,
  • Systematic assessment and evaluation of information security risks, with a view to their proper and timely management,
  • Enforcing secure development and maintenance of IT applications and services by third parties,
  • Data archiving, evasion of viruses and external invaders, systems access control, recording of all security incidents and management of unexpected developments,
  • Keeping the administration and personnel constantly informed about information security,
  • Control of migrated and exchanged information and data,
  • Immediate and effective handling of security incidents and breaches,
  • Complete commitment of the Company's Management to an accurate implementation of the Security Policies and all applicable national and Community legislation.

The information security officer is responsible for reviewing and monitoring the operation of the system, as well as to inform all personnel involved for the Information Security Policy.

All the company staff involved in the activities and procedures described and related to Information Security, have the responsibility to implement the policy and related Procedures in their field of work. Management and all employees of the company are committed to achieving the organization's goals and to comply with the principles of Information Security. We are also committed to the continuous increase of the level of Information Security through the continuous improvement of the Quality Management and Information Security Management System and by providing the necessary resources to achieve the above

The CEO