Acceptable Use and Information Security Policy

You can find our Acceptable Use Policy here. The acceptable use policy, among other things, establishes clear rules for the protection of information by setting out rules for:

  • Use of Devices

  • Installation of Software

  • Use of Email, Internet

  • Passwords and UserID

  • Classification of information

  • Protection of information and documents

  • Telework / home office

  • Reporting of security incidents and vulnerabilities

  • Destruction of information and storage media

  • Return of received devices and information

You can find our Information Security Policy (“InfoSec Policy”) here. The InfoSec Policy includes, among other things, the following topics:

  • Access Control

  • Anti-Malware

  • Asset Management

  • Backup

  • Cryptography

  • Data Classification

  • Document Retention

  • HR Security

  • Mobile Device

  • Password

  • Physical Security

  • Supplier Relationships and Agreements

  • System Acquisition, Development and Maintenance