Information Security Management
ISO/IEC 27001- This framework is the foundation for Zensar’s information security management system (ISMS).
Information Security Management System Policy –
We at Zensar Technologies Ltd and Professional Access, a division of Zensar are committed to protect the information assets of all our interested parties, providing information security awareness to all associates and to ensure continual improvement in information security in all our business activities/processes while meeting applicable business, legal or regulatory and customer requirements through regular review of our Information Security Management System.
Information Security objectives -
- Protection of customer information
- Protection of information assets belonging to the company
- To provide confidence to business partners and customers where information needs to be shared
- Compliance - ISMS as business enabler by implementing all applicable ISMS controls
The top management of Zensar defines roles and responsibilities and appointed dedicated Information Security team, in implementing this Policy and achieving the objectives, to ensure that:
- Requirements of its interested parties are understood
- Developing policies, procedures, guidelines and provide awareness to users for implementation of the same.
- Establishing an effective Information Security Management System within the organization.
- Roles and responsibilities are assigned with appropriate authority to achieve information security objectives
- Information is accessible and available only to those authorised to have access, whenever required
- Safeguarding the accuracy and completeness of information and processing mechanisms
- Review of information security and IT risks within a defined risk management framework in which risks are identified and appropriate risk treatment controls implemented and documented
- Operating and maintaining an established Information Security Management System within the organization and demonstrating confidence to our customer(s) that their most valuable assets are secured.
- Establish and implement necessary Incident response procedure to timely address any incidents taking place.
- Providing a secure working environment for all our associates working for Zensar and Professional Access, a division of Zensar
- Timely tested and maintained business continuity and disaster recovery plans for critical IT resources.
- Evaluate the performance and effectiveness of the information security management system
- Regular review of ISMS and take timely corrective actions; and
- Identify opportunities for continuous improvements in ISMS