We follow Information Security Management System in all the processes and technology wherein
- Information is protected against any unauthorized access.
- Confidentiality of information is assured.
- Integrity of information is maintained.
- Availability of information to authorized persons for business processes is maintained.
- Information security training and awareness are imparted to all the employees.
- A systematic approach is adopted to risk management