1. Purpose and Scope

This policy establishes guidelines for protecting company information assets, ensuring data security, and maintaining confidentiality across all operations.

2. Data Classification

3. Access Control

User Access Management

4. Network Security

5. Device Security