Being a responsible institution is embedded in AABSyS corporate culture and it forms the basis of the trust that our customers, partners, and stakeholders place in us. At AABSyS, it is our constant endeavor to improve the IT infrastructure, comply with regulations and license agreements. As part of this process, we have framed robust IT policies that protect the privacy of clients, ensure safety of data, and prevent loss of information.
AABSyS IT is a certified IT compliant company. We are a highly copyright conscious organization, and we make all reasonable efforts to ensure that we do not violate or infringe any copyright or Intellectual Property Right (IPR). We have strong internal IT compliance policies, and we have built a robust internal system to tame software license compliance through automation. In addition, we get an IT compliance audit organized through an established third-party organization periodically, to ensure strict IT and software Compliance.
AABSyS IT has adopted ISO 27001 with an objective to bring information security under management control through specific requirements. We use a structured approach to define and meet the security requirements and a formal approach to risk management. Using ISO 27001 standards enables us to manage the security of information and assets, and provides confidence to our clients, partners, and stakeholders that security requirements are in place and their interests are adequately safeguarded.
In addition, AABSyS has established several policies and procedures for the safe access, sharing, control, monitoring and management of information. Adequate security measures have been implemented to control and secure information from unauthorized changes, deletions, and disclosures. The following information security policies provide management direction and support for information security across the organisation:
- Email Security Policy
- Internet Security Policy
- Application Security Policy
- Firewall Security Policy
- Third Party Access Policy
- Desktop Security Policy
- Security Acceptance Policy
Access Management aims to grant authorized users the right to use a service, while preventing access to non-authorized users. Workforce members are provided access to organizational information and networks through a documented process which is reviewed and updated periodically. AABSyS has established strong policies to monitor and control information access within the organization:
- Log and Monitoring Policy
- User Access Management Policy
- Information Classification and Handling Policy
- Network Access Policy
- Third Party Access Policy
- Backup Policy
- Change Management Policy
These IT compliance practices helps AABSyS to ensure the confidentiality, integrity, and availability of our information assets while being protected against risks, vulnerabilities, and threats.