Global Information Security Policy (GISP)
Compliance & Certifications
The purpose of the Global Information Security Policy (GISP) is to deﬁne the measures and controls iResearch Services has in place in order to protect its information and its customers’ information and to comply with local and international laws, standards, and regulations.
It serves as a central policy document with which all employees and contractors must be aligned with and deﬁnes actions and prohibitions that all users must follow.
The scope of this policy is all iResearch Services information, including customer information, source code, diagrams, ﬁnancial information, PII, and PHI (where applicable).
The scope of this policy is the entire iResearch Services organization, including its subsidiaries, employees, contractors, subcontractors, partners, and anyone who creates, maintains, stores, accesses, processes, or transmits iResearch Services’ information.
CEO: The Chief Executive Oﬃcers are responsible for the overall privacy and security practices of the company.
ISO: The Information Security Oﬃcer is responsible for all information security aspects of the company.
DPO: The Data Protection Oﬃcer is responsible for ensuring proper protective measures of personal data are in place and overseeing the privacy aspect of the company’s product and practices.
Conﬁdentiality: The information is available or disclosed only to those authorized for it.
Integrity: All information assets are accurate and complete.
Availability: All information is accessible and usable upon demand.
Encryption: The process of transforming information using an algorithm to make it unreadable to anyone other than those who have a speciﬁc “need to know”.
Personally identiﬁable information (PII): Any information about an individual that can be used to distinguish or trace an individual‘s identity, such as name, Identiﬁcation number, date and place of birth, biometric records, medical information, ﬁnancial information, etc.
Third Party: All vendors, subcontractors and other parties under contract with iResearch Services.
1.4. Information Security Objectives
- Align with iResearch Services’ business objectives and support the company’s effort to achieve these objectives;
- Ensure that all security efforts are aligned with the company’s obligations as a fast-growing public company;
- Maintain a comprehensive and up-to-date information security plan to mitigate information security risks;
- Prevent security incidents at their earliest stage, and if they occur, detect, and contain security incidents as early as possible;
- Maintain an up-to-date list of all assets and the risks associated with these assets.
1.5. Organization of Information Security
iResearch Services ISO has the overall responsibility for the company’s information security.
To provide guidance and continuous monitoring of the company’s practices, the following representatives, at a minimum, conduct a weekly Security Forum:
- Director Operations
- IT Manager
- Compliance Specialist
Additional representatives from the company’s departments may join the forum as needed.
1.6. Information Security Management
All iResearch Services employees, contractors, and third parties should adhere to the company’s policies, have their relevant responsibilities communicated to them as part of their onboarding and on a regular basis, and have 24/7 access to the policies. All policies should be reviewed at least annually. Whenever there is a major change in the company’s practices that may affect the conﬁdentiality, integrity, or availability of the company’s or its customers’ data, the applicable policies will be reviewed.
All policies must be approved by a member of the senior management.
1.7. Continuous Improvement
iResearch Services continuously assesses potential risks to its service and evaluates the need for protective measures, basing its remediation strategy on the ﬁndings’ severity.
The following periodic assessments are executed:
- Internal & External audit – ISO 27001
- Application vulnerability scans – On an ongoing basis
- Overall risk assessment of critical information systems – Annually
2. Roles and Responsibilities
Conﬂicting duties and areas of responsibilities should be segregated to reduce the opportunities for unauthorized or unintentional modiﬁcation or misuse of the organization’s assets.
2.1. Senior Management
The Senior Management of the company has the overall responsibility for ensuring that the company’s commitment to this policy is met.
The Senior Management should provide adequate resources to maintain and improve the Information Security Management System (ISMS) within the company.
2.2. Director Operations
The Director Operations is responsible for approving security budgets.
In addition, the Director Operations communicates the results of essential ISMS activities (such as Risk Assessment, Risk Treatment Plan, Operational Plan and Goals, etc.) to both third parties (as applicable) and Senior Management.
2.3. ISO & Information Security Audit Team
The ISO & ISA team is responsible for deﬁning the company’s security strategy and the implementation and enforcement of information security processes and controls. The ISO reports to Senior Management.
The ISO’s main responsibilities are:
- Ownership of the Information Security Management System (ISMS) documentation.
- Leading the process of periodic risk assessment as part of the security policy.
- When applicable, recommend changes to policies, standards, and procedures.
- Ensuring that all critical company assets are secured and controlled.
- Developing and maintaining an information security education, training, and awareness program.
- Advising on compliance with laws, regulations, best practices, and frameworks.
- Building security-related budget and investment plans.
2.4. Security Steering Committee
The security steering committee is responsible for reviewing the strategic security plan and approving it. The security steering committee will meet once a year.
The security steering committee members are:
- Director Operations
2.5. Information Security Forum
The Security Forum is the operational forum for all information security activities.
Its responsibilities are:
- Coordinating the development and implementation of information management practices, including policies, standards, guidelines, and procedures;
- Coordinating the development and implementation of security-related issues in the company products, code, and infrastructure;
- Addressing ongoing security-related issues raised by the company employees, vendors, partners, and customers;
- Coordinating and sharing information among Forum members to ensure consistent execution of the information security management activities across the organization.
The company’s Security Forum will meet at least once a month.
2.6. Asset Owner
Asset Owners are managers held accountable for the protection of particular signiﬁcant assets. They may delegate information security tasks to other individuals but remain accountable for the proper implementation of the tasks. The Information Asset Owners are responsible for:
- Appropriate classiﬁcation and protection of information assets;
- Specifying and funding suitable protective controls;
- Authorizing access to information assets in accordance with their classiﬁcation and business needs;
- Ensuring timely completion of regular system/data access reviews;
- Monitoring compliance with protection requirements affecting their assets.
All employees are required to comply with the company’s information security policies and standards and should use company assets according to the company’s Acceptable Use Policy (internal).
3. Information Security Implementation
3.1. Human Resources Security
A company’s employees are among its most valuable resources. Employees have access to sensitive information by virtue of their job. Securely managing the human resources of iResearch Services is an essential part of the overall security of the company and is covered in the HR Security Policy (internal).
3.2. Asset Management Security
Lack of knowledge and familiarity with the targets of attack in an organization poses a signiﬁcant risk. Mapping an organization’s assets and deﬁning the measures to secure them signiﬁcantly decreases the risk level of an organization.
- All Company assets (such as data, software, hardware, ) will be accounted for and have an owner;
- Asset Owners will be identiﬁed for all assets and will be responsible for the maintenance and protection of their assets;
- All information should be classiﬁed and handled according to its sensitivity levels as detailed in the Data Classiﬁcation Policy (internal).
- Asset management security is detailed in the Asset Management Policy (internal).
3.3. Access Control
Accessing assets is one of the most sensitive processes in an organization. Failure to uphold appropriate access privileges to resources may put the organization at a signiﬁcant risk.
Access privileges in iResearch Services are provided according to the need-to-know and least-privilege principles. All security aspects of access control are detailed in the Access Control Policy (internal).
3.4. Physical and Environmental Security
The physical and environmental security aspect refers to the measures that iResearch Services utilizes in order to secure its physical premises and assets. It is detailed in the Physical and Environmental Security Policy (internal).
3.5. Operations Security
The capacity management of the existing systems and the process for accepting new systems within the company should be conducted according to the company’s policies. A change management process is in place to ensure that changes are well-controlled. For more information, please refer to the company’s IT Change Management Procedure (internal).
To ensure the protection of the information iResearch Services handles on behalf of its customers against loss, backups shall be taken and tested regularly in accordance with an agreed policy, as detailed in the Backup Policy (internal).
3.6. Communications Security
Communications security deals with the prevention of unauthorized access to information in transit, i.e., information that is sent from one IT entity to another one.
Communication security is covered in the Physical and Environmental Policy (internal).
3.7. Supply Chain Security
iResearch Services uses third-party solutions for certain aspects of its service. Such third-party relations may include cloud service providers, outsourced contractors, remote support, etc. When implementing a third-party solution, certain security measures should be taken in order to ensure that the third party does not negatively impact iResearch Services’ risk level.
Supply chain security is covered in the Vendor Policy (internal).
3.8. Information Security Incident Management, Business Continuity Plan (BCP), and Disaster Recovery Plan (DRP)
iResearch Services invests substantial efforts to prevent any incidents that may impact the conﬁdentiality, availability, and integrity of the data it processes on behalf of its customers. Notwithstanding this, it is not possible to fully mitigate the risk of incidents. In case of an information security incident, iResearch Services will detect and contain the incident in the shortest possible time frame. All aspects of information security incident handling are covered in the Information Security & Data Incident Response Procedure (internal), Disaster Recovery Plan (DRP), and Business Continuity Plan (BCP, internal).
iResearch Services is committed to adhering to any applicable laws, regulations, and standards. This is done by continuously identifying new local and international laws, new regulations, and the publication of new standards.
4. Policy Lifecycle
4.1. Additions, Changes, and Deletions
- Alterations to established policies, standards, and baselines should be made as necessary.
- Each request should include the business justiﬁcation for requesting such a change.
- The Director Operations should review each request and provide approval/denial.
- The Security Team is responsible for ensuring all relevant changes or additions are communicated to the company’s employees.
4.2. Review Process
- The Global Information Security Policy should be reviewed and updated annually, or when necessary, in accordance with business or regulatory requirements.
- Information security policies, standards, and baselines should be reviewed at least every 12 months to ensure that they are consistent and properly address the following:
- Business needs and business environment – controls should remain effective from both cost and ongoing operational perspectives and support the business without causing unreasonable disruption to its processes.
- External technology environment – opportunities and threats created by changes, trends, and new developments.
- Internal technology environment – strengths and weaknesses resulting from the company’s use of technology.
- Legal, regulatory, and contractual requirements.
- Other requirements speciﬁc to new or unique circumstances.
4.3. Delegation of Responsibilities
- The ISO may choose to delegate certain roles and responsibilities to speciﬁc employees or units as required.
- Delegated responsibilities are non-transferable.
4.4. Exception to Policies
- The Company’s employees and third parties are required to comply with said Policies and Standards.
- In the event that a policy or standard cannot be adhered to, an exception to such a baseline should be considered by the ISO.
- An exception may be granted only if the beneﬁts of the exception outweigh the resulting risks as determined by the ISO based on the recommendation of the Security Forum.
- Exceptions should be assigned due dates where applicable to ensure the timely implementation of the agreed-upon remediation strategies.
- Exceptions should be regularly reviewed to verify that remediation is achieved in time.