- Intent and Scope
- This information security policy (policy) provides the basis of information security management within Unicorn Media Co.
- Effective protection of business information creates a competitive advantage, both in the ability to preserve the reputation of the Company and in reducing the risk of the occurrence of negative events and incidents.
- Effective protection of business information creates a competitive advantage, both in the ability to preserve the reputation of the Company and in reducing the risk of the occurrence of negative events and incidents.
- This policy aims to balance the following priorities:
- Meeting the Company’s legislative requirements.
- Keeping data and documents confidential as required by the Company and its stakeholders.
- Ensuring the integrity of the Company’s data and IT systems.
- Upholding the Company’s reputation as a trusted recipient of data.
- Maintaining storage and back-up systems that meet the needs of the Company and its employees, contractors, volunteers, vendors and anyone else who may have any type of access to the Company’s systems, software, hardware, data and/or documents (collectively referred to as the Participants).
- This information security policy (policy) provides the basis of information security management within Unicorn Media Co.
- Responsibilities
- This policy applies to all Participants who are given access to the Company’s systems, software, hardware, data and/or documents.
- All Participants are responsible for protecting business information and systems. Where there is any doubt about the security of any action, the Participants should take a cautious approach and avoid any potential risks.
- The Information Security Officer is responsible for implementing this policy.
- This policy applies to all Participants who are given access to the Company’s systems, software, hardware, data and/or documents.
- Authorisation and Access
Managers should exercise caution when:
- Sharing information and documents with the Participants.
- Authorising the Participants to enter and control information systems.
- Giving the Participants access to information systems.
As a general rule, managers should follow a need-to-know basis. If there is any uncertainty regarding how information and documents should be shared, contact the Information Security Officer at Unicorn Media Co.
Our website address is: https://www.unicornmedia.com.au