Laman ini menggunakan cookies untuk memastikan Anda mendapat pengalaman terbaik didalam website kami Pelajari lebih lanjut
Information is protected from unauthorized access and modification, ensuring its confidentiality, integrity, and availability to users.
Achievement of information security objectives as key performance indicators of the Information Security Management System (ISMS).
Regular implementation and evaluation of information security risk assessments.
Availability of sufficient resources to effectively implement the Information Security Management System.
Consistent and effective implementation of Standard Operating Procedures related to the Information Security Management System.
All regulatory and legislative requirements are met, and employees receive regular information security training to maintain a high level of awareness and compliance.
Continuous improvement of the Information Security Management System’s performance.
Any breach or suspected weakness in information security is immediately reported, investigated, and addressed.