ISMS
Policy

Information Security Management
System Policy Statement

PURPOSE

This policy statement defines the framework within which the information security management system will be managed across CrownCity Technologies and demonstrates management commitment and support for information security management system throughout CrownCity Technologies. 

 

SCOPE

This policy is the primary policy from which all information security related policies emanate. This policy is applicable to all CrownCity Technologies personnel, contractors, vendors and other parties, and covers all information entrusted to or owned by CrownCity Technologies and stored, processed, or transmitted on the organizations information systems and operated by the organization

Information Security Objectives

CrownCity Technologies has set the following major information security

  • Objective 1 – Capacity Management and Change control mechanisms are adhered to strictly, and maintained for the purposes of ensuring system stability and availability.

  • Objective 2 –Virus management is ensured as a means of reducing system vulnerability virus threats to acceptable levels
  • Objective 3 – Patch Compliance management is religiously adhered to protect against the impact of cyber related threats. Objective 4 – Penetration tests and vulnerability management programmes are executed to reduce the level of exposure

Information Security Management System Policy

  • CrownCity Technologies is committed to the confidentiality, integrity and availability of her information assets and shall implement measures to ensure these are achieved through the establishment of appropriate controls.

 

  • CrownCity Technologies is committed to continual improvement of her information security program to protect the organization’s information assets against all threats.

 

  • CrownCity Technologies is also committed to complying with all applicable legal, regulatory and contractual requirements related to information security in her services and operations.

 

  • All users and custodians of information assets owned by or entrusted to CrownCity Technologies shall comply with this policy and exercise a duty of care in relation to the storage, processing, and transmission of the organization’s information and information systems.