Our plan to work with information security in a structured and risk-oriented way.
Information Security Policy
- Trust, But Verify Us
Our plan to work with information security in a structured and risk-oriented way.
Important
This is a public copy of an internal policy.
Elastisys work with information security management in a structured and risk-oriented way according to general community best practices, the principles of the international standard ISO/IEC 27001 as well as SKL requirements regarding GDPR and data management. Elastisys are ISO-27001 certified.
For Elastisys’ current information security work we have set these strategic goals:
Elastisys performs recurring risk assessments as part of the risk control procedures. The risk analysis, which is conducted annually, aims both to identify the critical information assets requiring protection as to provide a documented rationale for what is worth protecting. The risk analysis also relates the identified assets to the threats that the business may be exposed to, and the vulnerabilities that the business may be afflicted with. Finally, the risk analysis is aimed at developing a decision basis for the introduction of controls with the purpose of:
For each of these security disciplines organisational, administrative and technical controls are implemented and documented in such a way as to ensure that a satisfactory level of information security protection is achieved.
The organisation's management is ultimately responsible for the information security and therefore also for the information security management at the strategic level. This responsibility includes ensuring that there are economic and personnel resources available with the right skills to be able to reach the objectives of this information security policy.
Responsibility for operating the information security management system, which includes the identification of critical information assets, conducting of risk analyses, selecting and implementing controls and measures aimed at improving the organisations information security posture, initiating security audits and regular evaluation of information security management is delegated to the Chief Information Security Officer (CISO).
All co-workers who in any way handle sensitive information in conducting their work are responsible for protecting that information and to comply with the information security regulations in place. Customer information is always classified as confidential with a very limited set of employees being granted access.
The Information Security Management processes are annually reviewed and evaluated. Discrepancies and inadequacies as well as the occurrence of incidents are systematically documented for drawing upon experience of such events, which can be considered in the work for continuous improvement. The result of the information security related activities, ongoing activities and the estimated risk levels are handled as part of the recurring management meetings.
No cookie consent is needed! See our website privacy policy for details.
Arrows in text and dashed underlines under images indicate links that lead to domains not under our privacy policy.