Information Security

We highly appreciate and nurture information security. As a proof of high level information security management system and its continuous development, we have been granted ISO 27001 information security certificate.

 

Principles of Idesco Information Security Policy

Introduction

RFID readers of Idesco Oy secure people, buildings and assets as components integrated into a variety of security systems across both public and private sectors.

We have ISO27001 certificate. That certificate shows our information security management system meets the highest information security requirements, thereby strengthening, on our behalf, our customers’ and their end customers’ information security.

Organisation and responsibilities

Idesco’s information security policy has been approved by company management.

Our information security is both managed and reviewed by company management, our IT security manager and system administrator.

Regular information security trainings are organized for all Idesco personnel, and information security training is integral part of each new employee’s orientation. Entire company’s personnel share responsibility for Idesco information security.

Implementing information security

Information security policy and instructions are provided to all Idesco personnel. Information security reviews and training are organised regularly.

Idesco company management regularly assesses information security risks and their implications, and then take the needed actions prescribed in response to those risk assessments. Both Idesco’s operational principles and its information security policy undergo annual review. Indeed, Idesco’s information security policy is designed to closely address the full range of Idesco operational principles, thereby ensuring robust adherence to it across the entirety of the company’s operations.

Our information security policy controls among others the following:

  • Risk assessment
  • Data classification and data handling
  • Handling of personal data
  • Information security requirements for suppliers
  • Content and organization of information security trainings
  • Monitoring and control
  • Regulation of information security deviations

Information security targets, actions and measures are followed as described here in the operational systems annual plan.

Contact Us

Name*