INFORMATION SECURITY POLICY

I.Introduction

Vermont Solutions firmly believes that the Information Security Policy is a key factor for the proper development of Vermont Solutions; it considers that, along with the provision of training and necessary resources for the development of the activity, they are the main pillars to offer customers services with the appropriate quality.

II. Principles

Vermont Solutions acknowledges the importance of ensuring the confidentiality, integrity, and availability of information, also known as the CIA triad. These principles are defined as follows:

Vermont Solutions is committed to safeguarding information from unauthorized access, ensuring that only authorized individuals have access to the information relevant to perform their functions.

Vermont Solutions is committed to safeguarding the accuracy and integrity of information, preventing unauthorized alteration, destruction, or modification thereof.

Vermont Solutions is committed to ensuring that information is available and accessible when required by authorized users, avoiding unplanned interruptions and minimizing downtime.

III. Objectives

The Information Security Management System has the following objectives:

  • Ensure compliance with applicable laws, regulations, and standards, as well as any requirements that Vermont Solutions deems necessary for continuous improvement.
  • Provide services with a level of security that meets and exceeds the needs of our clients.
  • Train personnel in line with technical changes and technological innovations affecting Vermont Solutions’ operations.
  • Efficiently allocate roles and responsibilities in the field of security.
  • Prevent potential Information Security defects and incidents before they occur, focusing on “continuous improvement” and communication.
  • Continuously evolve the Information Security Management System to meet the demands of our clients.
  • Raise awareness and motivate VERMONT SOLUTIONS personnel about the importance of implementing and developing an Information Security Management System.

IV.Actions

The organization will continuously seek opportunities for improvement in the field of information security. To achieve this, the following actions will be taken:

Periodic risk assessments will be conducted to identify new threats and vulnerabilities, and measures will be taken to mitigate the identified risks.

Regular reviews of information security policies and procedures will be conducted to ensure their ongoing relevance and effectiveness.

Necessary improvements will be implemented to strengthen information protection.

A system for monitoring and detecting information security incidents will be established to identify and promptly respond to potential security breaches.

Regular training will be provided to employees on topics related to information security, including best practices, security policies, and procedures. Awareness of the importance of information security will also be promoted throughout the organization.

Regular reviews and audits of information security controls will be conducted to ensure their effectiveness and compliance. Corrective measures will be taken in case of deviations or non-compliance.

New technologies and information security solutions that can enhance the protection of information assets will be considered and adopted.

The management establishes and reviews objectives and goals, using the defined policy as a framework, assigning responsibilities for their achievement, and establishing criteria for action.

Management is committed to implementing, maintaining, and improving the ISMS, providing it with the necessary means and resources, and urging all personnel to assume this commitment.

You can access the document of our Information Security Policy from here.