Information security policy

Information is one of the most important resources. Ensuring information security in all areas of our activity and business is our highest priority.

We believe that ensuring proper, efficient and effective protection of information and information processing systems is possible by building an organizational culture appropriate for this purpose and applying security measures appropriate to identified threats.

We undertake to create a comprehensive Management System covering information security by:

  • monitoring information security requirements specified in legal acts and quality standards;
  • monitoring threats and counteracting them by applying appropriate solutions that reduce the risk.
  • developing, monitoring and continuously improving processes related to information processing, in particular involving employees with appropriate competences in the field of information security and protection;
  • establishing general information security principles and detailed principles for managing individual groups of protected information. We are aware of the legal solutions regulating the principles of security and protection of individual groups of information, therefore establishing detailed principles for individual groups of information is particularly important.
  • establishing roles in information processing processes, in particular appointing persons responsible for individual areas, groups of protected information;
We oblige all employees to constantly take care of information security, in particular to apply the principles of this policy and the security standards indicated in the policy.

Our primary goal is to maintain the confidentiality, availability, integrity of protected information, to process it in accordance with the law, the terms of the agreement and the security standards applied, and in particular to protect IT systems used to process protected information.

The solutions adopted should allow for achieving an appropriate technical and organizational level, such that:

  • there is a guarantee of full protection of information regarding customers and employees;
  • there is a possibility of efficient action in crisis situations;
  • there is a possibility of ensuring the security of information regardless of its form and processing system;
  • the effects of threats do not affect the security of information.