Laserfiche WebLink
Security Policies and Procedures <br />5. Company business records and planning materials, including our customer list, <br />marketing and sales efforts, product line plans and more <br />6. Copyrighted materials, both which our Company creates and those which we <br />obtain under license from others <br />B. Policy <br />Compliance with these standards is mandatory. Any deviation from these <br />standards must be approved beforehand by the ISO. <br />III. Key Concepts <br />A. Information Security Principles <br />The protection of information can be described in several key dimensions: <br />1. Confidentiality <br />2. Integrity <br />3. Availability <br />4. Provability <br />In this document, the standards given are the Company defaults. They must be <br />applied where appropriate, but always balanced against the cost of implementing <br />the control, and the value of the information involved. <br />B. Definitions <br />To prevent confusion, these are the definitions used throughout this document. <br />Policies: Corporate documents which set out Virtru's position regarding business <br />processes, behavior of personnel and similar topics. Policies are a high-level statement <br />of Virtru's position. Some of Virtru's policies, which relate to information security are: <br />1. Information Security Policy <br />2. Privacy Policy <br />3. Acceptable Use Policy for IT Systems Users <br />4. Employment Policies <br />Standards: Rules that must be followed to enable an effective information security <br />program. Compliance with the Standards is mandatory, but deviation is possible if <br />approved by the ISO. <br />Standards define the minimum baseline procedures, practices and configurations for <br />systems, applications, controls, networks and related topics. Standards are designed to <br />provide a single reference point for use during software development and adoption, <br />Rev.2015.8.6 <br />13 <br />