BDC-IT-P-001 : Information Technology Usage Security Policy

BDC-IT-P-001 : Information Technology Usage Security Policy Ver 2.1

INTRODUCTION
This document describes the general concepts of information technology usage & security to be practiced in BDC. It also describes the needs and responsibilities of the relevant parties with regards to the implementation, monitoring, and update of BDC Information Technology Usage & Security Policies. BDC Information Technology Usage & Security Policies are developed to ensure that the Information Technology Usage & Security principles are met throughout the organization.
This document shall be reviewed at least once a year or if there are any significant changes occurred that affect BDC information technology usage & security.

PURPOSE
The Information Technology Usage & Security Policy is developed to establish the basic principles and responsibilities that need to be adhered to by all parties that access BDC information asset. It serves to remind all the parties of their responsibilities in relation to BDC information assets.

SCOPE
This Policy applies to all users of information assets including BDC’s employees, vendors, business partners, and contractor personnel regardless of geographic location.

This Policy covers all Information Systems (IS) environments operated by BDC or contracted with a third party by BDC.

All users are required to read, understand and comply with the Information Technology Usage & Security policy and other related policies, standards, and procedures. If any user does not fully understand anything in these documents, it is his responsibility to seek further clarification from the ISMS Manager.
    • Related Articles

    • BDC-IT-P-002: Information Technology Backup Policy Ver 1.5

      INTRODUCTION The purpose of Backup procedure is to ensure that critical information for the systems below are adequately backed up on to prevent loss of data: • Customer Portal • File Server • Building Management System • CCTV System • Access card ...
    • BDC-IT-P-006 : Network Security Policy Ver 1.0

      INTRODUCTION Ensuring the security and reliability of our network infrastructure is a top priority at BDC. This network security policy outlines our commitment to redundancy, advanced firewall and security controls, high availability, web filtering, ...
    • BDC-IT-P-009 : Password Policy Ver 1.0

      INTRODUCTION Passwords form an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of our resources. All staff, including contractors and vendors with access to BDC systems and ...
    • BDC-IT-P-007: Confidential Document Disposal Policy Ver 1.0

      INTRODUCTION In an era where the protection of sensitive information is of utmost importance, our office recognizes the need for a robust Confidential Document Disposal Policy. This policy sets clear guidelines and procedures for the secure disposal ...
    • BDC-IT-P-005: System Change Management Policy Ver 2.3

      INTRODUCTION The System Change Management Policy establishes a structured approach for managing changes to systems within our organization. This policy aims to ensure that changes are implemented efficiently, minimize risks to system integrity and ...