Information Security Policy

1. Introduction

Gateway Exim Ltd is committed to maintaining the confidentiality, integrity, and availability of all information systems and data. This policy outlines our approach to information security.

2. Security Objectives

  • Protect sensitive data from unauthorized access and disclosure
  • Ensure data integrity and prevent unauthorized modifications
  • Maintain business continuity and disaster recovery capabilities
  • Comply with applicable laws and regulations
  • Conduct regular security assessments and penetration testing

3. Access Control

Access to systems and data is granted based on the principle of least privilege. All staff members have access limited to information necessary for their role. Multi-factor authentication is required for sensitive systems.

4. Data Protection

Sensitive data is encrypted both in transit and at rest. We use industry-standard encryption protocols and regularly update our security measures to protect against emerging threats.

5. Network Security

Our network infrastructure includes firewalls, intrusion detection systems, and regular security monitoring. We maintain secure connections and isolate sensitive networks from general internet access.

6. Incident Response

We have documented incident response procedures to address security breaches quickly. In case of a security incident, affected parties will be notified as required by law.

7. Employee Training

All staff members receive regular information security training. We emphasize the importance of password security, phishing awareness, and data protection protocols.

8. Vendor Management

Third-party vendors and service providers are required to meet our security standards. We conduct security assessments and maintain security agreements with all vendors.

Last updated: December 2024