Security Policy

  • Protect Critical Information & Critical Information infrastructure from unauthorized access, use, disclosure, modification and disposal, whether intentional or unintentional.
  • Maintain Confidentiality, Integrity and Availability of Information related to organization’s critical processes & systems together with sensitive / personal information of employees and other related third parties.
  • Ensure business continuity through systemic reduction of information security risks in all spheres of its business operations.
Website last updated at: 14/12/2018 - 11:50 AM
  • Number of Visitors :