Version 1.0.1

Introduction

Information security is a holistic discipline, meaning that its application, or lack thereof, affects all facets of an organization or enterprise. The goal of the Ease Solutions Information Security Program is to protect the Confidentiality, Integrity, and Availability of the data employed within the organization while providing value to the way we conduct business. Protection of Confidentiality, Integrity, and Availability are basic principles of information security, and can be defined as:

Ease Solutions has recognized that our business information is a critical asset and as such our ability to manage, control, and protect this asset will have a direct and significant impact on our future success. 

This document establishes the framework from which other information security policies may be developed to ensure that the enterprise can efficiently and effectively manage, control, and protect its business information assets and those information assets entrusted to Ease Solutions by its stakeholders, partners, customers and other third-parties.

The Ease Solutions Information Security Program is built around the information contained within this policy and its supporting policies.

Purpose

The purpose of the Ease Solutions Information Security Policy is to describe the actions and behaviors required to ensure that due care is taken to avoid inappropriate risks to Ease Solutions, its business partners, and its stakeholders.

Audience

The Ease Solutions Information Security Policy applies equally to any individual, entity, or process that interacts with any Ease Solutions Information Resource.

Responsibilities

Executive Management 

Information Security Officer

All Employees, Contractors, and Other Third-Party Personnel

Policy

Waivers

Waivers from certain policy provisions may be sought following the Ease Solutions Waiver Process.

Enforcement

Personnel found to have violated this policy may be subject to disciplinary action, up to and including termination of employment, and related civil or criminal penalties. 

Any vendor, consultant, or contractor found to have violated this policy may be subject to sanctions up to and including removal of access rights, termination of the contract(s), and related civil or criminal penalties.

Version History

Version

Modified Date

Approved Date

Approved By

Reason/Comments

1.0.0

November 2021

 

Document Origination

1.0.1

June 2022

 

Minor revision