We strive to minimize damage through the prevention of security incidents and simultaneously declare to our customers, business partners, employees, and the general public that the company effectively protects information and resources, both its own and those entrusted to us.
Information is accessible only to employees who need it to perform their work, in accordance with the “need-to-know” principle. This approach ensures that sensitive data is not freely available and minimizes the risk of misuse or leakage, for example, when employees leave the company.
Employees are regularly trained and educated in information security to ensure they handle sensitive data correctly and comply with all established procedures and rules.
Violations of information security rules are considered serious breaches of internal regulations and work duties and are strictly sanctioned in accordance with the Labor Code.
All measures taken are proportionate to the actual level of risk, regularly evaluated, and adjusted according to current needs and circumstances to ensure maximum protection of company information and assets.
We strive to minimize damage through the prevention of security incidents and simultaneously declare to our customers, business partners, employees, and the general public that the company effectively protects information and resources, both its own and those entrusted to us.
Information is accessible only to employees who need it to perform their work, in accordance with the “need-to-know” principle. This approach ensures that sensitive data is not freely available and minimizes the risk of misuse or leakage, for example, when employees leave the company.
Our employees are regularly trained and educated in information security to ensure they handle sensitive data correctly and comply with all established procedures and rules. Violations of information security rules are considered serious breaches of internal regulations and work duties and are strictly sanctioned in accordance with the Labor Code.
All measures taken are proportionate to the actual level of risk, regularly evaluated, and adjusted according to current needs and circumstances to ensure maximum protection of company information and assets.