Gazyk | Information Security and Confidentiality Policy
page-template-default,page,page-id-15815,vcwb,ajax_fade,page_not_loaded,,qode-theme-ver-6.7,wpb-js-composer js-comp-ver-4.4.3,vc_responsive

Information Security and Confidentiality Policy

Information is the foundation of our business. Protection of confidential information, whether belonging to Gazyk or to others who have entrusted such information to us, is essential to our reputation and to the survival of our business.

This information can be in many forms-physical, electronic, and intellectual (such as knowhow), and can relate to any part of the businesses of Gazyk. Common examples include tool designs, application source code, smart card personalization data, marketing plans, clients’ reservoir information, information kept in the Corporate Directory, operating results, financial information, ongoing research planning, inventions, and techniques. While the technology applications we use and the other confidential information we develop usually belong exclusively to Gazyk, at times, we may also be entrusted with highly confidential information of others, including our customers.

It is vital to the business success of Gazyk that we maintain confidentiality to all such information. All business, financial and technical conversations, notes, manuals, and papers and other forms of confidential information, whether physical or electronic, must be protected and Gazyk employees are not to disclose confidential information to any unauthorized person, either intentionally or by accident.

Unintentional disclosure of confidential information can be just as harmful as intentional disclosure. Gazyk employees must be careful to avoid accidental disclosure-whether through careless conversations or the improper handling of documents, data, and software. Employees are to be adequately trained and are then expected to protect confidential information by adhering to the Information Security standards and procedures related to their use, administration, or support of information technology resources. Information Security will publish and update standards and procedures that apply to all employees and operations. The Quality and HSE function will continue to participate in information security risk identification and mitigation processes at operational sites. Personnel remains responsible for properly initiating new and terminating exiting user accounts, as well as the deployment of employee education, supported by the Information Security function. The ultimate responsibility for information security lies with the line management of each Product Line. They are to ensure it is addressed as a critical business issue by providing the leadership and resources required in their respective organizations. Management should ensure the organization’s compliance to the Information Security Standards through regular measurement of security results and audit of risk mitigation activities.

Any violation of this Policy may subject the employee to disciplinary action.