Information Security Policy

Version 1.0.1

Introduction

Information security is a holistic discipline, meaning that its application, or lack thereof, affects all facets of an organization or enterprise. The goal of the Ease Solutions Information Security Program is to protect the Confidentiality, Integrity, and Availability of the data employed within the organization while providing value to the way we conduct business. Protection of Confidentiality, Integrity, and Availability are basic principles of information security, and can be defined as:

  • Confidentiality – Ensuring that information is accessible only to those entities that are authorized to have access, many times enforced by the classic “need-to-know” principle.

  • Integrity – Protecting the accuracy and completeness of the information and the methods that are used to process and manage it.

  • Availability – Ensuring that information assets (information, systems, facilities, networks, and computers) are accessible and usable when needed by an authorized entity.

Ease Solutions has recognized that our business information is a critical asset and as such our ability to manage, control, and protect this asset will have a direct and significant impact on our future success. 

This document establishes the framework from which other information security policies may be developed to ensure that the enterprise can efficiently and effectively manage, control, and protect its business information assets and those information assets entrusted to Ease Solutions by its stakeholders, partners, customers and other third-parties.

The Ease Solutions Information Security Program is built around the information contained within this policy and its supporting policies.

Purpose

The purpose of the Ease Solutions Information Security Policy is to describe the actions and behaviors required to ensure that due care is taken to avoid inappropriate risks to Ease Solutions, its business partners, and its stakeholders.

Audience

The Ease Solutions Information Security Policy applies equally to any individual, entity, or process that interacts with any Ease Solutions Information Resource.

Responsibilities

Executive Management 

  • Ensure that an appropriate risk-based Information Security Program is implemented to protect the confidentiality, integrity, and availability of all Information Resources collected or maintained by or on behalf of Ease Solutions.

  • Ensure that information security processes are integrated with strategic and operational planning processes to secure the organization’s mission.

  • Ensure adequate information security financial and personnel resources are included in the budgeting and/or financial planning process.

  • Ensure that the Security Officer is given the necessary authority to secure the Information Resources under their control within the scope of the Ease Solutions Information Security Program.

  • Designate an Information Security Officer and delegate authority to that individual to ensure compliance with applicable information security requirements.

  • Ensure that the Information Security Officer, in coordination with the Security Officer, reports annually to Executive Management on the effectiveness of the Ease Solutions Information Security Program.

Information Security Officer

  • Provide updates on the status of the Information Security Program to Executive Management.

  • Manage compliance with all relevant statutory, regulatory, and contractual requirements.

  • Assess risks to the confidentiality, integrity, and availability of all Information Resources collected or maintained by or on behalf of Ease Solutions.

  • Facilitate development and adoption of supporting policies, procedures, standards, and guidelines for providing adequate information security and continuity of operations.

  • Ensure that Ease Solutions has trained all personnel to support compliance with information security policies, processes, standards, and guidelines. Train and oversee personnel with significant responsibilities for information security with respect to such responsibilities.

  • Implement and maintain a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures, and practices of Ease Solutions.

  • Develop and implement procedures for testing and evaluating the effectiveness of the Ease Solutions Information Security Program in accordance with stated objectives.

  • Develop and implement a process for evaluating risks related to vendors and managing vendor relationships.

  • Report annually to Executive Management on the effectiveness of the Ease Solutions Information Security Program, including the progress of remedial actions.

All Employees, Contractors, and Other Third-Party Personnel

  • Understand their responsibilities for complying with the Ease Solutions Information Security Program.

  • Use Ease Solutions Information Resources in compliance with all Ease Solutions Information Security Policies.

  • Seek guidance from the Information Security Officer for questions or issues related to information security.

Policy

  • Ease Solutions maintains and communicates an Information Security Program consisting of topic-specific policies, standards, procedures, and guidelines that:

    • Serve to protect the Confidentiality, Integrity, and Availability of the Information Resources maintained within the organization using administrative, physical, and technical controls.

    • Provide value to the way we conduct business and support institutional objectives.

    • Comply with all applicable regulatory and legal requirements

  • The information security program is reviewed no less than annually or upon significant changes to the information security environment.

Waivers

Waivers from certain policy provisions may be sought following the Ease Solutions Waiver Process.

Enforcement

Personnel found to have violated this policy may be subject to disciplinary action, up to and including termination of employment, and related civil or criminal penalties. 

Any vendor, consultant, or contractor found to have violated this policy may be subject to sanctions up to and including removal of access rights, termination of the contract(s), and related civil or criminal penalties.

Version History

Version

Modified Date

Approved Date

Approved By

Reason/Comments

1.0.0

November 2021

 

 

Document Origination

1.0.1

June 2022

 

 

Minor revision