Filip Lerach
Author: Filip Lerach

The introduction of the Information Security Management System (ISMS) according to ISO 27001

At the dab Group, we have always been committed to safeguarding our company's values and the confidential information of our customers, employees, and business partners. This dedication to information security has shaped our company and made us a trusted partner in the industry. However, we do not rest on our laurels. We believe that information security is a continuous process that significantly influences our business operations.

With this in mind, we are pleased to announce the introduction of an Information Security Management System according to ISO 27001. This system will be the backbone of our efforts in information security, ensuring that our customers, employees, and business partners can always operate in a secure environment.

Our Information Security Objectives: Confidentiality, Integrity, and Availability

Our information security objectives form the foundation of our efforts to ensure the confidentiality, integrity, and availability of the information and systems we process and store.

Confidentiality: Our primary goal is to ensure that sensitive information, whether it's business-critical data, personal information of our employees, customers, and partners, or trade secrets, can only be accessed by authorized individuals, instances, or processes.

Integrity: We are committed to keeping our data complete and unaltered. This means that our data, systems, and processes are correct, immutable, and indisputable.

Availability: We guarantee authorized users access to information and systems when they need them. This means that our business data and systems are always available to meet requirements.

Our information security objectives will ensure that all information and systems are available at the right time, exclusively to authorized users, complete, and undamaged. This is a commitment we make to our customers, business partners, and employees to continue collaborating successfully.

The introduction of the Information Security Management System will enable us to pursue these objectives even more consistently and ensure that information security is firmly embedded in all our processes and activities. We are proud to contribute to the security and protection of the information entrusted to us.

Comments (0)
Be the first who comments this blog entry.
Blog login

You are not logged in. Please log in to comment this blog entry.

go to Login