You can find our Acceptable Use Policy here. The acceptable use policy, among other things, establishes clear rules for the protection of information by setting out rules for:

  • Use of Devices

  • Installation of Software

  • Use of Email, Internet

  • Passwords and UserID

  • Classification of information

  • Protection of information and documents

  • Telework / home office

  • Reporting of security incidents and vulnerabilities

  • Destruction of information and storage media

  • Return of received devices and information

You can find our Information Security Policy (“InfoSec Policy”) here. The InfoSec Policy includes, among other things, the following topics:

  • Access Control

  • Anti-Malware

  • Asset Management

  • Backup

  • Cryptography

  • Data Classification

  • Document Retention

  • HR Security

  • Mobile Device

  • Password

  • Physical Security

  • Supplier Relationships and Agreements

  • System Acquisition, Development and Maintenance