We follow Information Security Management System in all the processes and technology wherein

  • Information is protected against any unauthorized access.
  • Confidentiality of information is assured.
  • Integrity of information is maintained.
  • Availability of information to authorized persons for business processes is maintained.
  • Information security training and awareness are imparted to all the employees.
  • A systematic approach is adopted to risk management