IT Policy

IT governance is an integral part of corporate governance of Sonu Marketing Private Limited (Company), and effective IT governance is the responsibility of the board of directors of Sonu Marketing Private Limited (“Board”) and its executive management. This Policy ensures implementation of this IT Framework which, inter alia, includes (i) Security aspects; (ii) User Role; (iii) Information Security and Cyber Security; (iv) Business Continuity Planning Policy; (v) Back-up Data.


I. Objective

1. Purpose

This policy defines the control requirements surrounding the management of access to information on Company’s computer and communications systems.

2. Scope

This policy applies to all Company’s computer systems and facilities, with a target audience of Company’s Information Technology employees and partners.

3. Policy applied to All the internal Parties

A. Access Control System

B. Authorization

C. Access and Privilege Assignment


II. PASSWORDS

1. Introduction

Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in a compromise of Company’s entire network. As such, all employees are responsible for taking the appropriate steps, as outlined below, to select and secure their password.

2. Purpose

The purpose of this policy is to establish a standard for the creation of strong passwords, the protection of those passwords, and the frequency of change.

3. Policy

A. General

B. Guidelines

The Password Construction Requirements
  1. Be a minimum length of eight (8) characters on all systems and maximum of twelve (12) characters.
  2. Not be a dictionary word or proper name.
  3. Not be the same as the User ID.
  4. Expire within a maximum of 45 calendar days.
  5. Password must have at least one alphabet and one numeric character and one special character.
  6. Not be identical to the previous five (5) passwords.
  7. Not be displayed when entered.
  8. Ensure passwords are only reset for authorized user.
  9. Not be transmitted in the clear or plaintext outside the secure location.

a. Password Deletion

All passwords that are no longer needed must be deleted or disabled immediately. When a user quits (retires, resigned, suspended, dismissed, etc.), Default passwords shall be changed immediately on all equipment or the user id must be disabled immediately.

b. Password Protection Standards

Do not use your User ID as your password. Do not share passwords with anyone. All passwords are to be treated as sensitive and confidential information.

Here is a list of “do not’s”

If someone demands a password, refer them to this document or have them call COMPANY help desk.

If an account or password is suspected to have been compromised, report the incident to COMPANY and change all passwords.

c. Application Development Standards

Application developers must ensure their programs contain the following security precautions:

d. Remote Access Users

Access to the COMPANY networks via remote access is to be controlled by using either a Virtual Private Network (in which a password and user id are required).


III. INFORMATION SECURITY

1. Policy Description

This is the collection of policies that implement the overall spirit of the management system. Policies are broad but topical in nature.

The Information Security Management System is

There is adequate focus on ensuring adequate protection of information assets by

  1. An effective Management System is established for Information Security.
  2. All policies are approved will be communicated to all Customers, vendors and other interested parties.
  3. Periodic reviews of this policy will be carried out to ensure its continued suitability and applicability.
  4. Periodic reviews of the policy implementation will be conducted by internal or external auditors.
  5. Company adheres to their customer’s policies, processes and other guidelines, if any, as required by and agreed with the customer.
  6. There is an effective mechanism to ensure continual improvement of Processes practiced.
  7. Senior management is fully committed to IT service management and information security.
  8. Threats and risks to information system assets are properly identified using effectively managed and structured Risk Management framework on periodic basis
  9. All identified Security risks in information systems have been reduced to an acceptable level.
  10. Information is protected against unauthorized access and malicious activities with required security infrastructure in place
  11. Measures are taken to assure confidentiality, Integrity and availability of information
  12. Build, maintain and review a competent and professional security organization to manage the implementation of, and compliance with, Information Security Policy, Standards and Procedures
  13. Give top priority to security awareness and education in order to ensure that all personnel are fully aware of the security requirements and all relevant security measures
  14. Compliance with Government Regulations, legislative and contractual requirements are ensured
  15. All breaches of information security, actual or suspected, are reported to, and investigated by the Incident Management Process.