Last updated: November 2, 2024
Information that is collected, analyzed, stored, communicated, and reported by Ecomagent is subject to potential risks such as theft, misuse, loss, or corruption. These risks may arise due to insufficient education and training, failure to adhere to security controls, and deliberate or accidental breaches. Such incidents could result in reputational damage, financial loss, non-compliance with legal standards, and possible judgments against Ecomagent.
This high-level Information Security Policy works alongside the ‘Information Risk Management Policy’ and ‘Data Protection Policy’ to provide a risk-based approach for protecting Ecomagent's information assets. The policy aligns with Ecomagent’s legal obligations, including the Terms of Service, Privacy Policy, Cookie Policy, and Data Processing Agreement.
The Information Security Policy and its supporting controls, processes, and procedures apply to:
Compliance with the controls outlined in this policy will be monitored by the Information Security Team and reported to the Information Governance Board. Internal audits and external evaluations will be conducted periodically to assess the effectiveness of the controls.
This policy will be reviewed annually by the Executives & Cyber Security personnel, or sooner if needed due to changes in legislation, security standards, or significant incidents. The next review date is scheduled for December 2025.
Ecomagent is committed to safeguarding its information assets through effective controls that ensure:
Ecomagent will maintain an Information Security Management System (ISMS) based on recognized standards such as ISO/IEC 27001 and comply with legal frameworks like GDPR and CCPA. Ecomagent will adopt a risk-based approach to implement the following controls:
A comprehensive set of lower-level controls, processes, and procedures will be developed to support the high-level Information Security Policy. These will be approved by the Executives, published, and communicated to all relevant parties within Ecomagent and third-party vendors as needed.
Governance for the management of information security will be clearly defined and implemented, including:
All personnel will be educated on Ecomagent’s security policies and their responsibilities. Training will be mandatory to ensure staff are informed about best practices and legal requirements. Role descriptions will include security responsibilities where appropriate.
All information assets, including data, software, hardware, and service utilities, will be documented and assigned an owner responsible for its security. Each asset will be classified based on legal requirements, business value, and sensitivity, with appropriate handling and retention schedules defined for each.
Access to information will be based on business needs, with users granted access only to the extent necessary for their role. Access control mechanisms will include:
Ecomagent will use encryption and cryptographic methods to protect the confidentiality, authenticity, and integrity of information. These methods will adhere to industry best practices, ensuring secure data storage and transfer, especially for personal and sensitive information.
Information processing facilities will be located in secure areas with multiple layers of protection against unauthorized access, damage, or interference. Security perimeters will be defined, and both internal and external controls will be implemented to protect critical assets.
Ecomagent will ensure the secure operation of its information processing systems through:
Network security controls will ensure that information exchanged within Ecomagent’s networks, as well as between Ecomagent and external entities, is secure. Tools and guidance will be provided for secure information transfer in line with classification and handling requirements.
Security requirements will be integrated into the development of new information systems and changes to existing systems. Systems will be subject to change control processes, and separate environments will be used for development, testing, and production.
Ecomagent’s security requirements will be incorporated into contracts with third-party suppliers. Supplier activity will be monitored, and audits will be conducted to ensure compliance with Ecomagent’s security standards.
Clear guidance will be available for identifying, reporting, and managing information security incidents. All incidents must be reported, and investigations will be conducted to rectify breaches and strengthen future security measures.
Business continuity plans will be developed and tested to ensure that critical processes are protected from system failures or disasters. This includes:
All information systems and their operations must comply with applicable laws, regulations, and contractual requirements. This includes:
Regular internal and external audits, IT health checks, and gap analyses will be conducted to ensure compliance with these requirements and best practices.
This document will be reviewed annually by Floris, Executive. The next review date is scheduled for December 2025.