Close

Information Security Policy

Introduction

eSafe Cyber Security Ltd (“eSafe”) has in place an Information Security Policy (“the Policy”) that sets the principles and mechanisms in order to ensure compliance with the applicable regulatory framework.

Policy

Keeping the Information Security, a top priority in the business and operational planning the eSafe Cyber Security top management has approved an Information Security Management System in order to ensure data security, business continuity and minimization of risk of damage by a) preventing information security incidents and b) reducing their potential impact.

The goal of this Information Security Policy is to set the framework for protecting the organization’s information assets against all internal, external, deliberate or accidental threats.

eSafe Cyber Security management declares a strong commitment to maintaining standards of information security in line with its business strategy and objectives. eSafe Cyber Secuirty shall establish, maintain, and operate an Information Security Management System according to the ISO/IEC 27001:2022 Standard to ensure that:

  • The information security performance is continuously improved.
  • A framework for establishing information security control objectives and controls is available to protect information against any unauthorized access and to reduce the risk of unacceptable use of any of the Company’s information resources.
  • A risk assessment approach is adopted regarding risk management.
  • Legislative, business, and regulatory requirements, as well as contractual security obligations, and needs and expectations by other interested parties are met.
  • Business continuity plans are developed, maintained, and tested.
  • Information security education and training is available for all employees.
  • All actual or suspected information security breaches are recorded and are thoroughly investigated.
  • All necessary documentation exists to support this Policy.

All employees are responsible for implementing this Policy and ensuring compliance in their area of activity and to report information security incidents.

This policy will be reviewed by the top management of eSafe Cyber Security at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy, and effectiveness.