INFORMATION SECURITY MANAGEMENT SYSTEM        Mysa Logo

Asset & Service Management Policy

(Doc. No: ISMS-PL-AMP)

Copyright Notice:

The present document or drawing is property of Mysa and shall not, under any circumstances, be totally or partially, directly or indirectly, transferred, reproduced, copied, disclosed, or used, without its prior written consent, for any purpose and in any way other than that for which it is specifically furnished or outside the extent of the agreed upon right of use.

     Revision History

Rev

Date
MM/DD/YYYY

STATUS

WRITTEN BY

CHECKED BY

APPROVED BY

1.0

05/01/2024

First released version

Mohit Jain

Karthik Tabjul

Arpita Kapoor

DOCUMENT REVISIONS

Sections changed in the last revision are identified by a vertical line in the right margin

Contents

1.        Introduction        3

2.        Scope        3

3.        Policy Statements        3

        3.1 Authorized Use        3

        3.2 Protection of Information Assets        3

        3.3 Access Control        4

        3.4 Prohibited Activities        4

        3.5 Personal Use        4

           3.6 Data Privacy and Confidentiality        4

        3.7 Responsible Use of Resources        4

        3.8 Prohibited Activities        4

4.          Technical Controls        5

4.1    Antivirus and Anti-Malware        5

8.        Document Management        5

9.        Policy Distribution        5


  1. Introduction

This policy establishes guidelines and procedures for the acceptable use of all assets, both physical and information within the organization. It aims to ensure the confidentiality, integrity, and availability of information, while also promoting responsible and ethical use of organizational resources. This policy aligns with the requirements outlined in the ISO 27001:2022 standard and applies to all employees and contractors’ users who have access to the organization's information assets.

  1. Scope

This policy applies to all information assets owned, managed, or used by the organization, including but not limited to:

  1. Policy Statement

  1. Unauthorized access or use of information assets
  2. Distribution of offensive, discriminatory, or harassing content
  3. Intentional introduction of malware or viruses
  4. Unauthorized disclosure or alteration of information e. Use of information assets for personal gain or non-business purposes

4. Technical Controls

The IT department shall implement following technical controls and security measures to enforce and support this policy. Sophos is installed on all the laptops before handing it over to the user. Sophos helps in protecting all endpoint devices through following measures:

The IT department shall provide awareness training and guidance to users regarding acceptable use of information assets.

5. Compliance

6. Policy Review

This policy shall be reviewed at least annually or when significant changes occur within the organization's information assets or regulatory requirements, to ensure its relevance and effectiveness.

7. Policy Distribution

This policy shall be distributed to all employees, contractors, and third-party service providers who have access to the organization's information assets. It shall be readily accessible and communicated through appropriate channels.

INTERNAL