Security
Last updated: February, 2026
General Information Security Policy
- Protect the Company’s informational and IT assets
(including but not limited to all computers, mobile devices,
networking equipment, software, and sensitive data) against all
internal, external, deliberate, or accidental threats and mitigate
risks associated with theft, loss, misuse, damage, or abuse of these
systems.
- Ensure information is protected against unauthorized
access. Users shall only have access to resources they are
specifically authorized to access. Allocation of privileges shall be
strictly controlled and reviewed regularly.
- Protect CONFIDENTIALITY of
information by preventing disclosure to unauthorized parties.
- Ensure INTEGRITY of information by
preventing unauthorized modification.
- Maintain AVAILABILITY of information
for business processes by ensuring authorized parties can access
information when needed.
- Comply with, and wherever possible exceed, national
legislative and regulatory requirements, standards, and best
practices.
- Continuously improve the Information Security
Management System by implementing corrective actions that improve
effectiveness.
- Develop, maintain, and test business continuity
plans to ensure operational resilience despite disruptions.
- Raise awareness of information security by making
security training available for all employees. Security awareness and
targeted training shall be conducted consistently, security
responsibilities reflected in job descriptions, and compliance with
security requirements expected and accepted as part of our culture.
- Ensure that no action is taken against any employee
who discloses an information security concern through reporting or
direct contact with the Information Security Management Leader, unless
such disclosure indicates, beyond any reasonable doubt, an illegal
act, gross negligence, or repetitive deliberate or willful disregard
for regulations or procedures.
- Report all actual or suspected information security
breaches to
security@acewaves.com
.