This Information Security Policy provides the Gamuda Group employees and third parties with a consistent set of security rules required to protect the company’s information, information assets and intellectual property.
The rule set forth in the Policy document has been defined to provide reasonable controls for protecting the company from a wide variety of security threats which could cause harm to Gamuda Group business activities. Defining and implementing Policy are one of the security layers that need to be put in place in order to safeguard the organization from traditional and cyber threats and vulnerabilities.
1.1 Definition of the Policy
The information security Policy is the management instructions indicating a course of action, a guiding principle, or an appropriate procedure, which is expedient, prudent, or advantageous. This Policy high-level statements that provide guidance to the organizational activities.
Policy(s) are mandatory. View it as the equivalent of an organization-specific law. Hence compliance with a control practice is required.
Policy(s) are also different from ‘procedure’. A Policy statement describes the general means for addressing a specific problem (a ‘high-level approach’) and should not become detailed and lengthy.
1.2 Scope of the Policy
This document deals with Information Security issues related to the corporate environment of the company, i.e. any activity that protects information and/or information assets of the company. The control practice apply to the security principles of confidentiality, integrity, and availability of information obtained, created, or maintained by the employees or non-employees (third party’s) accessing the company information asset.
It is the policy of Gamuda Group to ensure that information is properly managed, appropriately secured and protected against the consequences of breaches of confidentiality, failures of integrity or interruptions due to the availability of that information. The Management of Gamuda Group is committed to ensure that:
The Group shall follow a formal disciplinary process for employees who have allegedly violated the information security policies and procedures.
The purpose of Information Security Management is to protect all information assets of Gamuda Group, either electronic or paper, from all threats, whether internal or external, deliberate or accidental.
Gamuda Group through implementation of ISMS will ensure the following objectives:
The intention of Gamuda Group is to implement ISMS within the IT department. The detail scope of ISMS, specification and boundaries is further defined in the ISMS Manual.
Selection of the scope is based on IT department business-critical functions in Gamuda Group. This is complemented with the level of Confidentiality, Integrity and Availability of information in each business services.
The IT Governance Unit has direct responsibility on the overall maintenance of the information security Policy and providing advice and guidance on implementation and directly responsible for maintaining the codes and providing advice and guidance on company implementation.
The Units Heads in IT department are directly responsible for implementing the policy within their business areas, and for adherence by all their staff.
Staff should know, understand, and be held accountable for fulfilling their information security responsibilities.
This ISP statement covers the full range of Policy statements in mitigating risks associated with creating, amending, storing or disseminating information. This document consists of information security domains related to:
Each of the areas consists of at least one (1) security objective, and each security objective consists of at least one (1) policy statement.
Example:
Explanation:
ISP | : | Information Security Policy |
---|---|---|
060106 | : | The first two digits are for the major topic number, second two digits are for the security objective, and third two digits are the policy number. |
ISP Statement | : | The description of the ISP statement. |
Group / Personnel | : | The personnel or group of people affected by the policy statement, who may be considered as owners of specific policy statements. |