>
Country Selector InXpress.Global.Menu

Information Security Policy

Effective Date: 25 May 2018 (Updated 9 September 2022)

1.DEFINITION - The use of the term “company” in this Manual refers to InXpress Global Ltd and its affiliates, subsidiaries, master franchisees and franchisees.

2.INTRODUCTION - This Information Security Policy is a formal set of rules by which those people who are given access to company technology and information assets must abide.

The Information Security Policy serves several purposes. The main purpose is to inform company users: employees, master franchisees, franchisees, contractors and other authorized users of their obligatory requirements for protecting the technology and information assets of the company.  The Information Security Policy describes the technology and information assets that we must protect and identifies many of the threats to those assets.

This Information Security Policy also describes the user’s responsibilities and privileges. This document also contains procedures for responding to incidents that threaten the security of the company computer systems and network.

Policies, controls, practices and procedure are implemented consistent with industry-leading security.  These are physical, administrative and technical safeguards to protect the systems and data of the company.

All employees are to receive training and refresher training on all information security policies and procedures on commencing employment with InXpress and annually thereafter.

3.WHAT ARE WE PROTECTING? - It is the obligation of all users of the company systems to protect the technology and information assets of the company.  This information must be protected from unauthorized access, theft and destruction. The technology and information assets of the company are made up of the following components:

  •  Computer hardware, CPU, disc, Email, web, application servers, PC systems, application software, system software, etc.
  •  System Software including: operating systems, database management systems, and backup and restore software, communications protocols.
  • Application Software: This includes custom written software applications, and commercial off the shelf software packages.
  • Communications Network hardware and software including: routers, routing tables, hubs, modems, multiplexers, switches, firewalls, private lines, and associated network management software and tools.

4.CLASSIFICATION OF INFORMATION - User information found in computer system files and databases shall be classified as either confidential or non-confidential. The company shall classify the information controlled by them. The company is required to review and approve the classification of the information and determine the appropriate level of security to best protect it.

5.THREATS TO SECURITY

Employees implement these processes to reduce employee transfers of information:

  • Only give out appropriate rights to systems.  The principle of least privilege access to fulfil roles is to be followed.   Limit access to only business hours.
  •  Don’t share accounts to access systems.  Never share your login information with co-workers.
  • When employees are separated or disciplined, you remove or limit access to systems within 24 hours.
  • Physically secure computer assets, so that only staff with appropriate need can access.
  • Passwords should be a minimum of 12 characters, mix of upper & lower case, a combination of alpha numeric, contain special characters and not simply a single one placed at the end of the password, and be changed every three (3) months.  A users name should not form part of the password.  Passwords will be set to lockout after a number of failed attempts.  On all key systems MFA is implemented.
  • The use of personal devices for conducting work business is prohibited.
  • No personal, sensitive or confidential data is to be stored on any removable devices such as USBs.

External Breaches Implement these processes to reduce access to company systems:

  • Only give out appropriate rights to systems and follow the principle of least privilege access in order to fulfil roles. When a customer calls to change access verify they are the correct person.
  • When customer accounts are put on hold, remove or limit access to systems.
  • Passwords should be a minimum of 12 characters, mix of upper & lower case, a combination of alpha numeric, contain special characters and not simply a single one placed at the end of the password, and be changed every three (3) months.  A users name should not form part of the password.  Passwords will be set to lockout after a number of failed attempts.  On all key systems MFA is implemented.

6.USER RESPONSIBILITIES

This section establishes usage policy for the computer systems, networks and information resources of the office.  It pertains to all employees and vendors who use the computer systems, networks, and information resources as business partners, customers and individuals who are granted access to the network for the business purposes of the company.

Acceptable Use

User accounts on company computer systems are to be used only for business of the company and not to be used for personal activities.  Unauthorized use of the system may be in violation of the law, constitutes theft and can be punishable by law.  Therefore, unauthorized use of the company computing system and facilities may constitute grounds for either civil or criminal prosecution.

Users are personally responsible for protecting all confidential information used and/or stored on their accounts.  This includes their logon IDs and passwords. Furthermore they are prohibited from making unauthorized copies of such confidential information and/or distributing it to unauthorized persons outside of the company.

Users shall not purposely engage in activity with the intent to: harass other users; degrade the performance of the system; divert system resources to their own use; or gain access to company systems for which they do not have authorization.

Users shall not attach unauthorized devices on their PCs or workstations, unless they have received specific authorization from the employees’ manager and/or the company IT designee.

Users shall not download unauthorized software from the Internet onto their PCs or workstations.

Users are required to report any weaknesses in the company computer security, any incidents of misuse or violation of this policy to their immediate supervisor.

Use of the Internet

The company will provide Internet access to employees and contractors who are connected to the internal network and who has a business need for this access.  Employees and contractors must obtain permission from their supervisor and file a request with the IT Administrator.

The Internet is a business tool for the company.  It is to be used for business-related purposes such as: communicating via electronic mail with suppliers and business partners, obtaining useful business information and relevant technical and business topics.

The Internet service may not be used for transmitting, retrieving or storing any communications of a discriminatory or harassing nature or which are derogatory to any individual or group, obscene or pornographic, or defamatory or threatening in nature for “chain letters” or any other purpose which is illegal or for personal gain.

Monitoring Use of Computer Systems

The company has the right and capability to monitor electronic information created and/or communicated by persons using company computer systems and networks, including e-mail messages and usage of the Internet.  It is not the company policy or intent to continuously monitor all computer usage by employees or other users of the company computer systems and network.  However, users of the systems should be aware that the company may monitor usage, including, but not limited to, patterns of usage of the Internet (e.g. site accessed, on-line length, time of day access), and employees’ electronic files and messages to the extent necessary to ensure that the Internet and other electronic communications are being used in compliance with the law and with company policy.  All activity on the company system transacting in customer data (Webship and XMS) is captured via full audit logs detailing all activity by a user.  The audit logs are regularly audited.

7.ACCESS CONTROL

A fundamental component of our Cyber Security Policy is controlling access to the critical information resources that require protection from unauthorized disclosure or modification.  The fundamental meaning of access control is that permissions are assigned to individuals or systems that are authorized to access specific resources.  Access controls exist at various layers of the system, including the network.  Access control is implemented by logon ID and password.  At the application and database level, other access control methods can be implemented to further restrict access.  The application and database systems can limit the number of applications and databases available to users based on their job requirements.

User System and Network Access – Normal User Identification

All users will be required to have a unique logon ID and password for access to systems.  The user’s password should be kept confidential and MUST NOT be shared with management & supervisory personnel and/or any other employee whatsoever. All users must comply with the following rules regarding the creation and maintenance of passwords:

  • Password must not be found in any English or foreign dictionary.  That is, do not use any common name, noun, verb, adverb, or adjective.  These can be easily cracked using standard “hacker tools”.
  • Passwords should not be posted on or near computer terminals or otherwise be readily accessible in the area of the terminal.
  • Password must be changed every (90 days).
  • User accounts will be frozen after 5 failed logon attempts.
  • Passwords should be a minimum of 12 characters, mix of upper & lower case, a combination of alpha numeric, contain special characters and not simply a single one placed at the end of the password
  •  On all key systems MFA is implemented.

Users are not allowed to access password files on any network infrastructure component. Password files on servers will be monitored for access by unauthorized users.  Copying, reading, deleting or modifying a password file on any computer system is prohibited.

Users will not be allowed to logon as a System Administrator. Users who need this level of access to production systems must request a Special Access account as outlined elsewhere in this document.

Employee Logon IDs and passwords will be deactivated as soon as possible, and within 24 hours, if the employee is terminated, fired, suspended, placed on leave, or otherwise leaves the employment of the company office.

Supervisors / Managers shall immediately and directly contact the company IT Manager to report change in employee status that requires terminating or modifying employee logon access privileges.

Employees who forget their password must call the IT department to get a new password assigned to their account.

Employees will be responsible for all transactions occurring during Logon sessions initiated by use of the employee’s password and ID.  Employees shall not logon to a computer and then allow another individual to use the computer or otherwise share access to the computer systems.

System Administrator Access

System Administrators, network administrators, and security administrators will have controlled and monitored access to host systems, routers, hubs, and firewalls as required to fulfill the duties of their job.

All system administrator passwords will be DELETED immediately after any employee who has access to such passwords is terminated, fired, or otherwise leaves the employment of the company.

Special Access

Special access accounts are provided to individuals requiring temporary system administrator privileges in order to perform their job.  These accounts are monitored by the company and require the permission of the company IT Manager.  Monitoring of the special access accounts is done by entering the users into a specific area and periodically generating reports to management.  The reports will show who currently has a special access account, for what reason, and when it will expire.  Special accounts will be available for the duration of the task in which permission was initially granted and will not be automatically renewed without written permission.

Connecting to Third-Party Networks

This policy is established to ensure a secure method of connectivity provided between the company and all third-part companies and other entities required to electronically exchange information with company.

“Third-party” refers to vendors, consultants and business partners doing business with company, and other partners that have a need to exchange information with the company.  Third-party network connections are to be used only by the employees of the third-party, only for the business purposes of the company.  The third-party company will ensure that only authorized users will be allowed to access information on the company network.  The third-party will not allow Internet traffic or other private network traffic to flow into the network. 

This policy applies to all third-party connection requests and any existing third-party connections.  In cases where the existing third-party network connections do not meet the requirements outlined in this document, they will be re-designed as needed.

All requests for third-party connections must be made by submitting a written request and be approved by the company.

Connecting Devices to the Network

Only authorized devices may be connected to the company network(s).  Authorized devices include PCs and workstations owned by company that comply with the configuration guidelines of the company.  Other authorized devices include network infrastructure devices used for network management and monitoring.

Users shall not attach to the network: non-company computers that are not authorized, owned and/or controlled by company. 

NOTE: Users are not authorized to attach any device that would alter the topology characteristics of the Network or any unauthorized storage devices, e.g. thumb drives and writable CD’s.

Remote Access

Only authorized persons may remotely access the company network. Remote access is provided to those employees, contractors and business partners of the company that have a legitimate business need to exchange information, copy files or programs, or access computer applications.  Authorized connection can be remote PC to the network or a remote network to company network connection.  The only acceptable method of remotely connecting into the internal network is using a secure ID.

Unauthorized Remote Access

The attachment of (e.g. hubs) to a user’s PC or workstation that is connected to the company VPN is not allowed without the written permission of the company. Additionally, users may not install personal software designed to provide remote control of the PC or workstation. This type of remote access bypasses the authorized highly secure methods of remote access and poses a threat to the security of the entire network.

8.PENALTY FOR SECURITY VIOLATION

The company takes the issue of security seriously.  Those people who use the technology and information resources of company must be aware that they can be disciplined if they violate this policy.  Upon violation of this policy, an employee of company may be subject to discipline up to and including discharge.  The specific discipline imposed will be determined by a case-by-case basis, taking into consideration the nature and severity of the violation of the Cyber Security Policy, prior violations of the policy committed by the individual, state and federal laws and all other relevant information.  Discipline which may be taken against an employee shall be administrated in accordance with any appropriate rules or policies and the company Policy Manual.

In a case where the accused person is not an employee of company the matter shall be submitted to the Global COO.  The Global COO may refer the information to law enforcement agencies and/or prosecutors for consideration as to whether criminal charges should be filed against the alleged violator(s).

9.SECURITY HANDLING PROCEDURES

This section provides some policy guidelines and procedures for handling security incidents.  The term “security incident” is defined as any irregular or adverse event that threatens the security, integrity, or availability of the information resources on any part of the company network.  Some examples of security incidents are:

  • Illegal access of a company computer system.  For example, a hacker logs onto a production server and copies the password file.
  • Damage to a company computer system or network caused by illegal access.  Releasing a virus or worm would be an example.
  • A data breach
  • Denial of service attack against a company web server.  For example, a hacker initiates a flood of packets against a Web server designed to cause the system to crash.
  • Malicious use of system resources to launch an attack against other computer outside of the company network.  For example, the system administrator notices a connection to an unknown network and a strange process accumulating a lot of server time.

Employees, who believe their terminal or computer systems have been subjected to a security incident, or has otherwise been improperly accessed or used, should report the situation to their IT Administrator immediately.  The employee shall not turn off the computer or delete suspicious files.  Leaving the computer in the condition it was in when the security incident was discovered will assist in identifying the source of the problem and in determining the steps that should be taken to remedy the problem.

Full and comprehensive risks, stakeholders, incident classification, handling and reporting procedures are contained within the company Risk & Incident Response Plan.  These are to be strictly followed during any incident.

All incidents will be handled in accordance with the  Risk & Incident Response Plan.