{"id":251813,"date":"2022-06-22T12:19:35","date_gmt":"2022-06-22T12:19:35","guid":{"rendered":"https:\/\/www.webscale.com\/?page_id=251813"},"modified":"2022-06-22T12:19:35","modified_gmt":"2022-06-22T12:19:35","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.webscale.com\/information-security\/","title":{"rendered":"Information Security Management Commitment"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”075a99c8-6db3-4eef-b4ec-8c7879984678″ custom_padding=”45px||45px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}”][et_pb_text _builder_version=”4.19.5″ _module_preset=”0270faec-c4d6-43f9-a138-593c0e958406″ text_orientation=”center” global_colors_info=”{}”]<\/p>\n

Legal<\/h1>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_orientation=”center” global_colors_info=”{}”]<\/p>\n

Information Security Management Commitment<\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” link_font=”||||||||” link_text_color=”#5470ff” text_orientation=”center” global_colors_info=”{}”]Information Security<\/a> | Acceptable Use Policy<\/a> | Master SLA<\/a> | MSA<\/a> | DPA<\/a>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.19.5″ _module_preset=”3c235741-b8d5-4ac4-8de5-b30e3dc4c85d” background_color=”#F9F9F9″ global_colors_info=”{}”][et_pb_row module_class=”li-content” _builder_version=”4.19.5″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}”][et_pb_text module_class=”li-content” _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Version 2.0 – Dated September 14, 2022<\/p>\n

 <\/p>\n

1. Commitment to Information Security<\/strong><\/p>\n

<\/strong> With an understanding that ensuring information security is one of the most critical tasks of management, Webscale Networks will ensure that every person engaged in its operations will be committed to it.<\/p>\n

2. Information Security Policy<\/strong><\/p>\n

<\/strong> To build an information security management system aimed at protecting information assets, Webscale Networks will set out an Information Security Policy that serves as a foundation for the system. It will comply with it and continuously review it to improve its services.<\/p>\n

3. Protection of Information Assets<\/strong><\/p>\n

<\/strong> Webscale Networks will institute appropriate management measures according to the state of individual operations to unfailingly protect information assets from any threat to its confidentiality, integrity, and availability.<\/p>\n

4. Compliance with Laws and Regulations<\/strong><\/p>\n

<\/strong> Webscale Networks will comply with applicable laws and regulations, other rules, and contractual requirements to ensure information security.<\/p>\n

5. Education and Training<\/strong><\/p>\n

<\/strong> Webscale Networks will offer education and training to personnel engaged in its operations to improve their awareness of information security and familiarize them with the Information Security Policy.<\/p>\n

6. Prevention of Accidents and Actions<\/strong><\/p>\n

<\/strong> Webscale Networks will run its information security management system to ensure that every employee works to prevent information security accidents from occurring. Should an accident take place, we will swiftly implement appropriate actions, including those for preventing recurrence.<\/p>\n

7. Auditing<\/strong><\/p>\n

<\/strong> Webscale Networks will regularly audit the operation of its information security management system and carry out remedial actions as needed to maintain information security.<\/p>\n

8. Continuous Improvement<\/strong><\/p>\n

<\/strong> Every year we set information security goals, define, and plan activities to achieve those objectives, then, according to periodical review results, set the following year\u2019s goals. In addition, we regularly evaluate and review our Information Security Policy, its related internal regulations, and our management system, pursuing continuous improvement of information security.\u200b\u200b<\/strong><\/p>\n

9. Webscale Platform Security Commitments:<\/strong><\/strong><\/p>\n