Get Started with SeamlessHR

How many employees do you have?

Please select your company size
Please select your company size
Work Email
Field is required!
Field is required!
First Name
Field is required!
Field is required!
Last Name
Field is required!
Field is required!
Title
Field is required!
Field is required!
Company
Field is required!
Field is required!
Work Phone
Field is required!
Field is required!

INFORMATION SECURITY POLICY

Last updated:

May 11, 2022

Information Security Policy

Information Security is a priority at SeamlessHR. We devote significant resources to ensure the confidentiality, integrity, and availability of our data. SeamlessHR is committed to continuously evaluating and improving our policies, standards, processes, and information systems in supporting business and customer services, in contributing to operational and strategic business decisions, and in conforming to legal and statutory requirements. 

As a modern, forward-looking business, SeamlessHR recognises the need to ensure that its business operates smoothly and without interruption for the benefit of its customers, employees, and other stakeholders. In order to provide such a level of continuous operation, SeamlessHR has implemented an Information Security Management System (ISMS) in line with the International Standard for Information Security, ISO/IEC 27001. 

This information security policy forms a key part of our set of controls to ensure that our information is protected effectively and that we can meet our obligations to our customers, employees, and other stakeholders. This policy also states our intent to maintain a secure information-processing environment and to protect information assets.  

This policy has been approved and must be communicated to SeamlessHR employees. It will be reviewed and updated annually. The policy will also be updated as and when there is any change in the information-processing environment, which may have an impact on the information risk profile. 

Supporting policies for this information security policy include the following: 

 

  • Mobile Device Policy 
  • Human Resource Security Policy 
  • Asset Management Policy 
  • Access Control Policy 
  • Cryptography Policy 
  • Physical Security Policy
  • Operations Security Policy
  • Communications Security 
  • Secure Software Development Policy 
  • Supplier Relationships Policy 
  • Information Security Incident Management Policy 
  • Business Continuity Management Policy 
  • Information Security Compliance Policy 


Adedeji Oshunlana (Director/CTO) 

We serve cookies on this site to analyse traffic, remember your preferences, and optimise your experience.