Information Security Policy

Last updated: Oct 06, 2025

We implement organizational and technical measures to safeguard sensitive data.

1. Access Control

  • Access to personal and sensitive data is limited to authorized personnel only.
  • Role-based permissions are regularly reviewed.

2. Data Protection

  • All personal data is stored securely using encryption where applicable.
  • Regular backups are maintained to prevent data loss.

3. Incident Response

  • Security incidents are reported immediately and investigated promptly.
  • Corrective actions are taken to prevent recurrence.

4. Employee Awareness

  • Staff receive ongoing training in data protection and information security.

5. Continuous Improvement

  • Security measures are regularly reviewed and updated to meet evolving risks.

6. Contact