The overarching goal of Information Security Management is to protect the information's confidentiality, integrity and availability at the same time. Controls and procedures are implemented across the organization’s geographical sites and processes, including (but not limited to) document management, information asset management, IT operations, cybersecurity, physical security, personnel security and awareness. Protective measures to limit external threats, recovery strategies as well as other business continuity plans are implemented to limit potential risks.
Personal Data protection
Protecting personal information and individual privacy rights are treated with special attention within the company.