Purpose
This policy outlines the standards and procedures for the use of information systems and sharing of data within the company and outside as well, to protect the confidentiality, integrity, and availability of sensitive information.
Scope
This policy applies to all employees, individuals on third-party rolls, consultants, contractors, and third-party service providers or anyone else who has access to the company’s information systems and data.
Information Systems Usage
The information systems (including hardware, software, and network resources) provided by the company or purchased under the BYOD Policy are intended to support business operations. The following rules apply to their usage:
- All information systems and resources must be used in compliance with applicable laws and company policies.
- Employees must only access systems and data that are necessary for their role.
- Unauthorized access, tampering, or misuse of company information systems is strictly prohibited.
- Strong password protocols must be followed (minimum length, complexity, and regular updates). Password sharing is not allowed. Multi-factor authentication should be enabled for critical applications.
- Information systems must not be used for personal gain, illegal activities, or any activity that may be a threat to the company’s interest or harm its reputation.
- Any confidential data or sensitive information should not be shared in print/hard copy with anyone internally or externally without seeking approval from the Founder and CEO.
- Avoid keeping any passwords or critical information related to company in hardcopy or mention it in a
physical form which is easily accessible to others.
Data Classification and Protection
All information managed by NeoLiv is categorized into the following tiers for protection:
-
Confidential Information: This includes financial data, proprietary project details, investor information, customer information, and personal data of employees and customers.
-
Internal Use Only: Data intended for internal operations, such as policies, procedures, and operational reports.
-
Public Information: Data that can be freely distributed, such as marketing materials or information released in official public communications.
Confidential and internal information must be secured through encryption, access controls, and other appropriate measures to prevent unauthorized access or disclosure.