Information Security Policy
The Administration of DeepSea Technologies commits to manage Information Security Management issues with the same responsibility and importance with which it treats the entire operations of the business, for its customers and employees.
Specifically, the Administration of DeepSea Technologies is committed to supporting the implementation of Information Security Management methods to ensure the integrity, availability, and confidentiality of the information they manage.
DeepSea Technologies intends to carry out its commitment following the principles of prevention and protection in accordance with the legislative provisions but also with the requirements arising from the wider framework developed by the company for the management of risks of strategic importance, as well as through the publication of their actions and the continuous improvement of their performance in the areas of Information Security.
Τhis continuous effort is carried out by monitoring and applying modern technologies and international practices, defining goals and criteria based on which a continuous assessment of the level of risk is carried out, and implementing programs in the management of information security.
The constant search for ways to improve the applied information security management methods will help our company protect the information it manages more and more effectively. For the development of our actions, we will inform the customers, employees and shareholders of the company.
The Αdministration gives its full support to the Information Security Management System according to ISO 27001:2022 and, in consultation with the staff, is committed to defining objectives and goals which it will review at regular intervals so that it is always within the specifications it has set.
In specific, the policy’s goal is to safeguard the organisation’s information assets from any risks, whether internal or external, intentional or unintentional.
The organisation’s policy is to ensure that:
-
As required by the business process, information should be made available with minimal disturbance to staff and the general public.
-
The confidentiality of this data will be protected. Information confidentiality will be ensured, including but not limited to research, third parties, personal, and electronic communications data.
-
All legal and regulatory standards will be met.
-
Employees should get information security education, awareness, and training.
-
All real or suspected breaches of information security must be reported to and investigated by the appropriate authorities, including System Administration and Incident Response.
-
Appropriate access control will be maintained, and data will be kept safe from unwanted access.
-
All customer and sensitive data are encrypted and special authorisation for the relevant access is needed.
To complement the ISMS Policy, policies, procedures, and guidelines of DeepSea, they will be made available in both print and online forms through the company’s HRIS.
Chief Business Officer of DeepSea Technologies