INFORMATION SECURITY POLICY
We at Threadgold Plummer Hood Pty Ltd believe in leadership information security and remain committed to be the first brand of choice for our customers by providing “On-time every-time secured services”. We want to establish the leading position in our industry by being timely, reliable and ensuring information security. Information Security Management is the foundation of Threadgold Plummer Hood Pty Ltd to deliver the services with continual improvement and to achieve customer satisfaction. To support this strategy, we have implemented an information security management system (ISMS) based on ISO/IEC 27001.
According to the above direction all Threadgold Plummer Hood Pty Ltd staff are committed to:
- Use of all reasonable, appropriate, practical, and effective security measures to protect our important processes and assets in order to achieve our security objectives.
- Protecting and managing our information assets to enable us to meet our contractual, legislative, privacy and ethical responsibilities and satisfy applicable IS requirements and legal requirements.
- Protect the confidentiality, integrity and availability of information to guarantee that regulatory, operational and contractual requirements are fulfilled;
- Implement and conduct information security risk management to protect information and related assets from all threats, whether internal or external, deliberate or accidental;
- Encourage personnel to stay up to date with the latest security trends, regulations and procedures and conduct effective training;
- Availability, security and reliability of all the services we provide for our clients even if security incidents occur;
- Maintain and test business continuity plans;
- Review and re-evaluation of information security management system annually and/ or based on any system changes;
- Protect the system against unauthorized access;
- Investigate and report information security breaches to the Information Security Officer.
- Set, monitor and continuous improvement of Information security objectives.