Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The operation of this ISMS has many benefits for the business, including:

  • Ensuring the supply of goods and services to customers

  • Maintenance and enhancement of shareholder value

  • Compliance with legal and regulatory requirements

An Information Security Policy is available in both paper and electronic form and will be communicated within the organization and to all relevant stakeholders and interested third parties.

...

A risk management approach and process will be used which is line with the requirements and recommendations of ISO/IEC 27001. Risk management will take place at several levels within the ISMS, including:

  • Assessment of risks to the achievement of our information security objectives

  • Regular information security risk assessments within specific operational areas

  • Assessment of risk as part of the business change management process

  • At the project level as part of the management of significant change

We would encourage all employees and other stakeholders in our business to ensure that they play their part in delivering our information security objectives.

Yours sincerely,

Image RemovedImage Added

Jan Tenenberg, CEO

Stephen Kent, CFO

...