Information Security Policy
The continuity of the Take5 People regionally (“T5P”) is highly dependent upon the way which the information resources are managed. The principles used in setting the foundations for the policies governing information security management are:
- Information resources that support information processing are important assets (“information assets”) which must be appropriately protected from accidental or intentional compromise.
- The confidentiality, integrity and availability of information assets are essential for ensuring legal compliance and for maintaining competitive edge and the image of T5P.
- Information assets are provided to support business processes and should be used to derive benefit for T5P.
- All personnel who use information assets have a responsibility to protect them, and to minimize the risks that might result from inappropriate use.
Meet the speakers
This is the headingConsultant
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
This is the headingSales
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.