Loading...

Information and Cyber Security Policy

Document ID: APM002

01 Dec 2024

The Company recognises the need to ensure that its business operates smoothly and without interruption for the benefit of its customers, shareholders, and other stakeholders.

This policy emphasises the management commitment towards Information Technology and Cyber Security within the organisation. It deals with the provision of Information Technology (IT), Operational Technology (OT) and Cyber Security by the Company in Office and on-board vessels. These resources include, but are not limited to, IT/OT hardware, software, data, component, systems, applications, and services.

The policy is based on the following principles, which must be adhered to by all those responsible for the implementation of this policy and to whom this policy applies:

  • The information security resources of the Company are provided to support the vessels with various shipboard and office activities.
  • Authorized users are granted access to valuable sensitive data and to external networks on the basis that their use of IT resources shall be responsible, ethical, and lawful at all times.
  • Authorized users are required to observe and comply with the Company’s policy, and other local laws which may apply.
  • Data and information relating to persons and other confidential matters acquired for business purposes shall be protected.
  • The Company’s IT resources must not under any circumstances be used to humiliate, intimidate, offend, or vilify others based on their race, gender, or any other attributes.
  • All electronic assets owned and produced by the Company are copyrighted and under no circumstances shall be distributed to any external parties.
  • All employees have responsibilities for ensuring appropriate security control procedures are followed to safeguard the availability, integrity, and confidentiality of the Company’s information.

The Company believes all cyber incidents, are avoidable. The Company will thoroughly investigate these in order to avoid reoccurrence.

Employees are expected to operate with reasonable discipline in operating passwords for files, folders, and machines, deleting unnecessary or extraneous material from folders and machines and retaining relevant data back-ups with the local IT support.

Detailed procedures to comply with this policy can be found in the Cyber Security Manual of the Company’s Safety Management System.

 

NAME

Designation