Information Security
Information Security is a priority at SeamlessHR. We devote significant resources to ensure the confidentiality, integrity and availability of our data. SeamlessHR is committed to continuously evaluating and improving our policies, standards, processes and information systems in supporting business and customer services, in contributing to operational and strategic business decisions, and in conforming to legal and statutory requirements.
As a modern, forward-looking business, SeamlessHR recognises the need to ensure that its business operates smoothly and without interruption for the benefit of its customers, employees and other stakeholders. In order to provide such a level of continuous operation, SeamlessHR is implementing an Information Security Management System (ISMS) in line with the International Standard for Information Security, ISO/IEC 27001.
This information security policy forms a key part of our set of controls to ensure that our information is protected effectively and that we can meet our obligations to our customers, employees, and other stakeholders. This policy also states our intent to maintain a secure information-processing environment and to protect information assets.
This policy has been approved and must be communicated to SeamlessHR employees. It will be reviewed and updated annually. The policy will also be updated as and when there is any change in the information-processing environment, which may have an impact on the information risk profile.
Supporting policies for this information security policy include the following:
- Mobile Device Policy
- Human Resource Security Policy
- Asset Management Policy
- Access Control Policy
- Cryptography Policy
- Physical Security Policy
- Operations Security Policy
- Communications Security
- Secure Software Development Policy
- Supplier Relationships Policy
- Information Security Incident Management Policy
- Business Continuity Management Policy
- Information Security Compliance Policy
- Remote Work PolicyÂ
- Configuration Management PolicyÂ
- Threat Intelligence FrameworkÂ
- Cloud Security PolicyÂ
- Network Security PolicyÂ
- Open-source Software use and Adoption PolicyÂ