Security Policy

  • Protect Critical Information & Critical Information infrastructure from unauthorized access, use, disclosure, modification and disposal, whether intentional or unintentional.
  • Maintain Confidentiality, Integrity and Availability of Information related to organization’s critical processes & systems together with sensitive / personal information of employees and other related third parties.
  • Ensure business continuity through systemic reduction of information security risks in all spheres of its business operations.
  • Establish, maintain and continually improve Information Security Management System (ISMS) complying with ISO27001:2013 and meeting all the applicable legal, statutory, regulatory and contractual requirements.
Website last updated at: 13/10/2018 - 12:10 PM
  • Number of Visitors :