Information security policy
Updated on 13 July 2023.
At Keybe, we understand the paramount importance of data security, and thus have implemented a series of measures aimed at preserving the integrity, confidentiality, and availability of our information. Our policy applies to every party involved with Keybe, from our own staff to third parties, interns, practitioners, suppliers, and the general public.
Our Aims
- Minimize risk in our most important functions.
- Comply with principles of information security and administrative functions.
- Foster trust among our customers, partners, and employees.
- Support technological innovation and protect technological assets.
- Establish robust policies, procedures, and instructions for information security.
- Enhance the culture of information security across all personnel and clients.
- Ensure business continuity in the face of incidents.
Our Approach
Keybe employs a continuously evolving Information Security Management System (ISMS), tailored to meet both the needs of our business and regulatory requirements. This system relies on the following principles:
Transparency: Responsibilities regarding information security are clearly defined, shared, published, and accepted by each of the employees, contractors, or third parties.
Protection: We safeguard the information generated, processed, or protected by our business processes and information assets.
Risk Mitigation: We actively work to minimize financial, operational, or legal impacts due to misuse of information.
Internal Security: We guard against threats originating from our own personnel.
Operational Control: We regulate our business processes, ensuring the security of technological resources.
Access Control: We implement rigorous controls to regulate access to information, systems, and network resources.
System Lifecycle Integration: Security is an integral part of our information systems lifecycle.
Incident Management: We ensure effective improvement of our security model through the proper management of security events and system weaknesses.
Business Continuity: We maintain the availability of our business processes and operational continuity based on the potential impact of events.
Legal Compliance: We strictly adhere to all established legal, regulatory, and contractual obligations.
Through these principles, Keybe seeks to uphold the highest standards of information security, providing a safe and reliable environment for our customers and partners.