Security Policy

  • Protect Critical Information & Critical Information infrastructure from unauthorized access, use, disclosure, modification and disposal, whether intentional or unintentional.
  • Maintain Confidentiality, Integrity and Availability of Information related to organization’s critical processes & systems together with sensitive / personal information of employees and other related third parties.
  • Ensure business continuity through systemic reduction of information security risks in all spheres of its business operations.
Website last updated at: 19/07/2019 - 05:46 PM
  • Number of Visitors :