Ensure that Xeleron management and employees comply with the requirements of the security policy. Minimize the risk of damage to company assets, information, reputation, hardware, software or data. Ensure that Xeleron employees and computer systems do not infringe copyright or licensing laws. Clearly define company policies regarding all aspects of information, hardware, firmware and software management.
Define a systematic approach to risk assessment by identifying a methodology appropriate for the ISMS, the established corporate information security, and the legal and regulatory requirements.
Establishing policies and objectives for the ISMS to reduce risks to acceptable levels. Determining criteria for accepting risks and establishing acceptable risk levels.
All managers are directly responsible for the implementation of the security policy within their business areas and for the compliance of their employees. It is the responsibility of each employee to comply with the security policy. Failure to comply may result in disciplinary action.
The Security Officer is responsible for maintaining the security policy and providing advice and guidance on its implementation.