Protect Ethiack, Lda's informational and IT assets (including but not limited to all computers, mobile devices, networking equipment, software and sensitive data) against all internal, external, deliberate or accidental threats and to mitigate the risks associated with the theft, loss, misuse, damage or abuse of these systems.
Ensure information will be protected against any unauthorized access. Users shall only have access to resources that they have been specifically authorized to access. The allocation of privileges shall be strictly controlled and reviewed regularly.
Protect Confidentiality of information. When we talk about the confidentiality of information, we are talking about protecting the information from disclosure to unauthorized parties.
Ensure Integrity of information. Integrity of information refers to protecting information from being modified by unauthorized parties.
Maintain Availability of information for business processes. Availability of information refers to ensuring that authorized parties can access the information when needed.
Comply with and, wherever possible, exceed, national legislative and regulatory requirements, standards and best practices.
Develop, Maintain and Test business continuity plans to ensure we stay on course despite all obstacles that we may come across. It is about "keeping calm and carrying on!".
Report all actual or suspected information security breaches to firstname.lastname@example.org.