Privacy Policy
We at IDS are _________ to maintaining and improving ___________ security within its practices, __________, minimizing its exposure to _____ and ensuring the confidentiality ___ integrity of information processed __ Information Technology Enabled Services (____) and Business Process Services (BPO) we offer
We provide timely ____________ of information to all ________ stakeholders while complying with ___ business, statutory, regulatory and ___________ requirements as applicable.
IDS is a certified ___ 27001:2013 (Information Security Management ______) operation, as deemed compliant __ Moody International certification Ltd., ___ world's leading accredited certifying ______ on ISMS.
At IDS, in order __ provide our customers with _ secured IT environment, we:
- Develop, implement, and effectively _______ information security management practices
- Follow a risk-based approach ____ is structured and proactive __ help plan and implement ____, resulting in an appropriate _____ of organizational security
- Implement suitable controls to _________, implement, maintain and improve ___ ISMS
- Ensure that the right ______, processes, procedures, and technologies ___ in place to protect ___ customers' valuable information assets
- Protect the confidentiality, integrity, ___ availability of data resources
- Follow stringent compliances and _________ an audit trail of ___ those who have the ______ to client information
- Maintain well defined security ________ regarding physical site security, _______/_______ security, Information security, personnel ________, Internet usage policies and _______ level agreements