Security Policy
Founder prioritizes the safety and security of our customers’ online experiences. Our approach to data handling is meticulously crafted to ensure utmost security and privacy. Delve into our comprehensive security policy encompassing risk management, data security, and privacy measures.
Information Security Objectives:
Our paramount objective is to uphold the continuity of core and ancillary business operations with minimal disruptions. We commit to maintaining the absolute integrity and availability of all information utilized or stored by Founder. Ensuring the confidentiality of relevant information remains a cornerstone of our operations.
Information Security Policy:
Our policy aims to shield the organization’s information assets from diverse threats, whether internal or external, deliberate or inadvertent. We strictly adhere to the following principles:
- Access Control: Confidential information is accessible only to authorized personnel, in line with the principle of least privilege.
- System Stability: Modifications to Founder’s systems must prioritize stability, security, and availability to maintain consistent operations.
- Data Integrity: Preservation of the integrity of client and business information is non-negotiable.
- Industry Leadership: We aspire to lead the industry by providing top-notch security solutions to our partners and their clientele.
- Regulatory Compliance: Compliance with regulatory and legal requirements is integrated into our systems and processes.
Information Security Risks:
Founder employs an Information Risk Management Framework to effectively identify and address risks in a timely manner. This framework enables us to adopt a risk-based approach, seamlessly integrated into our decision-making processes.
Responsibilities:
Every staff member is accountable for adhering to the Information Security Policy. Managers bear direct responsibility for implementing security requirements within their teams. The Management Representative oversees the design, planning, implementation, and operation of the Information Security Management System (ISMS) at Founder.
The Internal Audit Committee conducts periodic assessments to verify the effectiveness of our information security management system.
Policy Review:
Our Information Security Policy undergoes regular reviews, especially in the event of significant organizational changes, to ensure its continued relevance and efficacy.
At Founder, safeguarding information integrity and maintaining robust security measures are fundamental tenets of our operations. We are committed to fostering a safe and secure online environment for our customers and stakeholders.