Datacorp

  • Information Security Policy

    Purpose

    DataCorp Traffic Private Limited (“DataCorp Traffic”) is a global leader in the Transportation Industry. This statement is made by “DataCorp Traffic Private Limited”, and its subsidiary entities, “DC Transportation GDC Private Limited”, “DC Traffic Data Pty Ltd”, “TrafficLenz UK limited” and “SH Traffic Data Private Limited”, all collectively herein after referred to as “DataCorp Traffic”. The purpose of this Information Security Management System (ISMS) is to protect the information assets from significant internal and external threats that may expose them to risk and continually improve it. The implementation is important to maintain our integrity as DataCorp Traffic Private Limited (DTPL) provides “Various IT Enabled Transportation Data Analysis Services as per Customer Requirements.” Taking into consideration the importance of information assets, steps will be taken to protect unauthorized access, modifications and disclosure of any critical information. DataCorp Traffic Private Limited – commits itself to provide fully secured environment through:

    • Safe and secure transmission, handling and processing of organization, customer data and resources.
    • Comprehensive consideration of business, regulatory and contractual security obligations.
    • Formal assessments and implementation of appropriate controls for risks associated with manual and computer-based systems to ensurenfidentiality, integrity and availability.
    • Adequate Information Security Awareness training to all staff members of DTPL
    • Implementation of Business continuity plans and proper backups
    • Continual improvements to the effectiveness of the ISMS
    • Confidentiality of valued assets will be given high priority
    • Integrity of information through protection from unauthorized modifications
    • Any Incident involving information disclosure to any third party will be dealt seriously

    Objectives

    • Assured delivery of services.
    • Protection to DTPL information
    • Implementing the SLAs.
    • To comply with legal & contractual requirements.
    • All breaches of information security and suspected weaknesses are reported and investigated.

    Responsibility & Applicability

    The Top Management is committed in implementing this policy. This policy is applicable to all employees working in the organization.

    Goals

    The goal is to identify through appropriate risk assessment the value of information assets and to understand their vulnerabilities and the threats that may expose them to risk.

    Mitigate the risk to an acceptable level through the implementation and maintenance of a formal Information Security Management System.