Information Security Management System Policy

Intelsol information security management system (ISMS) is a set system used to manage and control information, risks in security as well as maintaining the integrity, protection and preservation and confidentiality of information.

Intelsol information security management system (ISMS) includes policies around access control, incident management, data protection, business continuity, physical security, human resources and technical procedures.

Top management is committed to ensuring the confidentiality, integrity, and availability and providing comprehensive protection to its information assets against the consequences of confidentiality breaches, failures of integrity and/ or interruptions to their availability.

To provide adequate protection to information assets, we have built the Information Security Management System (ISMS) which includes the respective policies to be followed in a diligent, consistent, and impartial manner. We have implemented procedures and controls at all levels to protect the confidentiality and integrity of information stored and processed on our systems and ensure that information is available only to authorized persons as and when required.

This document details our commitment to ensure the protection of our own information assets as well as our customers information assets, and to allow the use, access, and disclosure of such information in accordance with appropriate standards, laws, and regulations. All workforce members, employees, customers, and third parties who use our information processing facilities are required to comply with this Information Security policy. All our existing policies, relating to personnel, administration, protection of confidential information, and other areas would apply equally to the information systems environment.

We demonstrate leadership and commitment with respect to the information security management system by:

  • Ensuring that the information security policy and the information security objectives are established and are compatible with our strategic direction
  • Ensuring integration of ISMS requirements into our processes
  • Ensuring that the resources needed for ISMS are available
  • Communicating the importance of effective information security management and of conforming to the information security management system requirements
  • Ensuring that ISMS achieves its intended outcome(s)
  • Directing and supporting persons to contribute to the effectiveness of ISMS
  • Promoting continual improvement
  • Supporting other relevant management roles to demonstrate their leadership as it applies to their areas of responsibility


We have established an internal role as ISMS Responsible, to be fulfilled by key personnel who are responsible to identify areas of security and compliance concern across our organization, act as the first line of defense in enhancing the appropriate security and compliance posture overseeing and maintaining information security and compliance as per the standard and industry best practices.

The ISMS Responsible is knowledgeable in legal cross regulation, policy, products, and IT, and are interested in ensuring five of the trust principles – confidentiality, integrity, availability, privacy, and security – with regard to data protection by law, compliance, and standards across the organization.

We are committed to and conduct our business activities lawfully and in a manner that is consistent with its all relevant regulatory and legislative requirements.

The governance of the security programs (including risk management, internal audit, information security review and performance monitoring) is performed by top management. As part of this program, additional role-based training is provided to the employees, before they start handling sensitive and confidential information. Information security and compliance training is provided as a quick reference guide to all employees. Training logs identifying the training class, attendee, and date are kept by the HR department.

Further, we have identified various types of behaviors that contribute to building security culture in an organization. Intelsol has used multiple channels of communication, enforcement, clear policies, rules and norms. Secure behavior is also encouraged through recognition, e.g., security trainings, and strong messages to anyone who doesn’t follow these principles. Secure behavior is strongly influenced through raising awareness.

Top management has conveyed its expectations of employees by stressing the principle of zero tolerance for unacceptable behavior relating to information security, rewarding good behavior, recognizing and rewarding people for good work towards risk management. This has ensured that information security is practiced in daily operation.

We use cookies and other tracking technologies to improve your browsing experience on our website, to show you personalized content and targeted ads, to analyze our website traffic, and to understand where our visitors are coming from. By accepting our Terms and Conditions, you consent to our use of cookies and other tracking technologies. Terms & Conditions

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.