background

Security Policy

EVR Energy Limited

Security Policy

Introduction

At EVR Energy Limited, we prioritize the security of our operations, information, and assets. This Security Policy outlines our commitment to safeguarding our systems, data, and the trust of our customers and stakeholders.

Security Objectives

  • Data Protection: We are dedicated to protecting sensitive and confidential data from unauthorized access, disclosure, alteration, and destruction. This includes customer data, intellectual property, and business-critical information.
  • Infrastructure Security: We will maintain robust security measures to protect our physical and digital infrastructure, ensuring the integrity and availability of our systems.
  • User Access Control: We will implement strict access controls to ensure that only authorized individuals have access to company resources, systems, and data.
  • Security Awareness: We will foster a culture of security awareness among our employees and partners, providing training and resources to recognize and mitigate security threats.
  • Incident Response: We will establish an effective incident response plan to address security breaches, minimize damage, and swiftly recover from security incidents.
  • Compliance: We will adhere to all relevant laws, regulations, and industry standards related to security and data protection.

Roles and Responsibilities

  • Management: Management is responsible for setting the security objectives, providing the necessary resources, and ensuring that security policies and practices are implemented and maintained.
  • Employees: All employees are responsible for following security policies and best practices, reporting security concerns, and participating in security awareness programs.
  • Security Officer: The designated security officer is responsible for overseeing the development and implementation of security measures, conducting risk assessments, and responding to security incidents.

Security Measures

  • Access Control: We will use role-based access control to restrict system and data access to authorized personnel only.
  • Firewalls and Intrusion Detection: We will implement firewalls and intrusion detection systems to protect against external threats.
  • Data Encryption: Sensitive data in transit and at rest will be encrypted using industry-standard encryption protocols.
  • Regular Auditing and Monitoring: We will regularly audit and monitor systems and networks for signs of security breaches or anomalies.
  • Data Backup and Recovery: We will maintain reliable data backup and recovery systems to ensure data availability in case of disasters or system failures.
  • Security Training: Employees will receive security training to recognize and respond to security threats and best practices.

Incident Response

In the event of a security breach, EVR Energy Limited will:

  • Notify affected parties and appropriate authorities as required by law.
  • Conduct an internal investigation to assess the impact of the breach and take corrective actions.
  • Review and update security policies and practices to prevent similar incidents in the future.

Compliance

We will regularly review and update our security policies to remain in compliance with relevant security regulations and industry standards.

Conclusion

EVR Energy Limited is committed to maintaining a secure and resilient business environment. We recognize that security is a continuous process and will continually assess and improve our security measures to protect our systems, data, and the trust of our stakeholders.

For inquiries or feedback regarding our security policies and practices, please contact us at [email protected].