INTRODUCTION
This document describes the general concepts of information technology usage & security to be practiced in BDC. It also describes the needs and responsibilities of the relevant parties with regards to the implementation, monitoring, and update of BDC Information Technology Usage & Security Policies. BDC Information Technology Usage & Security Policies are developed to ensure that the Information Technology Usage & Security principles are met throughout the organization.
This document shall be reviewed at least once a year or if there are any significant changes occurred that affect BDC information technology usage & security.
PURPOSE
The Information Technology Usage & Security Policy is developed to establish the basic principles and responsibilities that need to be adhered to by all parties that access BDC information asset. It serves to remind all the parties of their responsibilities in relation to BDC information assets.
SCOPE
This Policy applies to all users of information assets including BDC’s employees, vendors, business partners, and contractor personnel regardless of geographic location.
This Policy covers all Information Systems (IS) environments operated by BDC or contracted with a third party by BDC.
All users are required to read, understand and comply with the Information Technology Usage & Security policy and other related policies, standards, and procedures. If any user does not fully understand anything in these documents, it is his responsibility to seek further clarification from the ISMS Manager.