ISMS Policy
The Synergates Business Solutions Private Limited services provides a range of technical services and support that are offered to individuals, businesses, and organizations to help them manage, operate, and optimize their information technology systems and infrastructure. The Synergates Business Solutions Private Limited is committed to:
- Integrity of all business processes, information assets, and supporting IT assets and processes, through protection from unauthorized modification, guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. The unauthorized modification or destruction of information could have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals;
- Availability of all business processes, information assets, and supporting IT assets and processes to authorized users when needed, ensuring timely and reliable access to and use of information. The disruption of access to, or use of, information or an information system could have a serious adverse effect on organizational operations, organizational assets, or individuals;
- Confidentiality of all information assets (information is not disclosed to unauthorized persons through deliberate or careless action). Preserving authorized estrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. The unauthorized disclosure of information could have a limited adverse effect on organizational operations, organizational assets, or individuals;
- All IT-enabled processes and stakeholders shall follow the rules and regulations or circulars published in the organization;
- All audit trails and logs, as decided by the Management shall be maintained and monitored by MR;
- All operational and system changes shall be monitored closely; these shall adhere to the change management process;
- Complies with the laws, regulations, and contractual obligations which are applicable to the organization in general and in particular to its ISMS;
- All applicable information security requirements are satisfied;
- Continual improvement of the information security management system.
Approved by C.E.O