These are employees responsible for providing, restricting, or terminating access to information systems and servers for EticSoft employees.
The employee who manages EticSoft’s information security department. Responsible for ensuring and monitoring the implementation of the following procedures. Approves access provision in emergency response scenarios, whether pre-defined or not, outside of access permissions determined by the Board.
The following information assets are classified as Confidential or Sensitive data. Written permission from the Board and recording of access is required to view these assets. Transportation, modification, and sharing of confidential data is strictly prohibited.
Due to EticSoft’s transparency principle, EticSoft employees can access all of the following information, while customers and business partners can access information in items 4, 5, and 6,
Exceptions: Transparent information can be temporarily and/or permanently restricted from access by the Board with stated justification.
Any information asset not found in the Confidential Information Assets or Transparent Information Assets sections of this document is considered “Unclassified”. Access to such data is subject to the Information Security Manager’s permission. When the Information Security Manager encounters a request for access to such an asset, they apply to the Board in writing.