Information Security Policy

Information Security Objectives

The objective of B2BSlots in information security management is to ensure that its core and support business operations continue to operate with minimal disruptions.
B2BSlots will ensure that all information used or stored by B2BSlots has absolute integrity and availability. B2BSlots will ensure that all relevant information is managed and stored with appropriate confidentiality procedures.

Information Security Policy

The purpose of this Policy is to protect the organization's information assets from all threats, whether internal or external, deliberate or accidental.
The CEO of B2BSlots has approved this Information Security Management System [ISMS] Policy.

It is the organization's policy to ensure that:

  • Information must be available with minimal disruption to staff and the public as required by the business process. This will ensure that vital information and services are available to users when and where they need them;
  • The integrity of this information will be maintained. This means safeguarding the accuracy and completeness of the information by protecting it against unauthorized modifications;
  • The confidentiality of the information will be ensured, not limited to research, third parties, personal data, and electronic communications. This will ensure the protection of valuable or sensitive information against unauthorized disclosures or unavoidable interruptions;
  • Regulatory and legislative requirements will be met. This will ensure that the organization remains in compliance with relevant business, national, and international laws;
  • A Business Continuity Management Framework will be in place, and Business Continuity Plans will be produced to counteract disruptions to business activities and protect critical business processes from the effects of major failures or disasters. Business Continuity Plans will be maintained and tested;
  • Information security education, awareness, and training will be available for staff and relevant external parties;
  • All actual or suspected information security breaches will be reported and investigated by the relevant authorities, not limited to the Incident Response process;
  • Appropriate access control will be maintained, and information will be protected against unauthorized access.

ISMS Risks

Information security within B2BSlots is managed through the Risk Management Framework.
Policies, Procedures, and Guidelines, not limited to Information Security, will be available in print and online via an intranet system to support the ISMS Policy.

Responsibilities

It is the responsibility of each staff member to adhere to the ISMS Policy. All managers are directly responsible for implementing the ISMS Policy within their units and for their staff's adherence.

The Management Representative is the Security Director and has direct responsibility for designing, planning, implementing, and operating the ISMS within B2Bslots. They also participate in drafting and/or managing the development of relevant policies, procedures, and guidelines, not limited to information security. The Internal Audit Unit has direct responsibility for verifying the effectiveness of the ISMS Policy.

This ISMS Policy is subject to review when significant changes occur in the organization.

Loading