InformationClassificationPolicy
Last updated: January 20, 2023
Scope
- This policy sets out ZORA COMMUNICATIONS arrangements for ensuring that information is classified in terms of legal requirements, value, criticality and sensitivity to unauthorized disclosure or modification.
Responsibilities
- Zora Communications performs various internal vulnerability scans and package monitoring on a constant basis.
- Zora Communications also performs external vulnerability-scans/penetration-tests periodically.
Reporting
- This activity is carried out by knowledgeable staff from all levels and parts of the organization in the process.
- CISO
- Manager & Team-leads
- Staff
Monitoring for Vulnerabilities
- The terminology used to classify information in ZORA COMMUNICATIONS is as follows.
- Public
- Internal
- Company Confidential
- Client Confidential
| Classification | Description | Examples |
|---|---|---|
| Public |
|
|
| Client Confidential |
|
|
| Company Confidential |
|
|
- Where practicable, the information category shall be embedded in the information itself.
Breach of Policy
- Employees will be subject to appropriate disciplinary action, up to and including dismissal, for knowingly or unknowingly revealing information of a confidential nature. The Company will enforce this policy in accordance with all applicable federal, state, and local laws.
Records
- Acceptable Use Policy
- Appointment letter
- Asset & Access Inventory Register