Information Security Policy (ISP)
1. Purpose

The purpose of this Information Security Policy (ISP) is to define mandatory security requirements to protect Gunav Technologies’ information assets from unauthorized access, disclosure, modification, misuse, loss, or destruction.

This policy ensures that all personnel are adequately trained, assessed, authorized, and monitored before accessing company or client information systems.

2. Scope

This policy applies to all individuals associated with Gunav Technologies, including but not limited to:

  • Permanent and temporary employees

  • Interns and trainees

  • Contractors and consultants

  • Third-party service providers

The policy covers all information assets, systems, networks, cloud platforms, applications, and endpoints used for company business.

3. Mandatory Security Training & Onboarding
  1. Training Distribution

    • HR will distribute official Information Security Training Video Modules via company email upon joining.

    • Personnel must complete the full training series before attempting the assessment.

  2. Training Timeline

    • Mandatory training must be completed within 7 calendar days from the official joining date.

  3. Access Restriction

    Until training completion and assessment clearance are verified: - No project allocation is permitted - System access remains restricted

Any non-compliance or delay will be escalated to the Director.

4. Examination & Competency Assessment (MCQ)
  1. Assessment Format

    • Formal MCQ-based examination designed and reviewed in coordination with the company’s External Security Advisor.

  2. Passing Criteria

    • Minimum required passing score: 80%.

  3. Retake Policy

    • Individuals scoring below 80% must re-study training materials and retake the examination.

    • No project work or system access is allowed until the required score is achieved.

5. HR Certification & Project Allocation

The onboarding security process is considered complete only after:

  • The individual achieves a score of 80% or higher, and

  • HR issues a formal confirmation email to the employee and the respective Project Lead.

Strict Rule: Project Managers and Team Leads must not assign tasks, credentials, or system access without documented HR confirmation.

6. Technical Security Controls
  1. VPN Usage

    • VPN usage is mandatory for all remote access, server connections, and cloud administration activities.

  2. Password Management

    • Use of the company-mandated Password Management Application is compulsory.

    • Password reuse and manual credential storage are strictly prohibited.

  3. Secure Credential Sharing

    • All credentials must be shared using the approved Secure Vault feature.

    • Credentials must allow login without revealing plaintext passwords.

  4. Endpoint Security

    • Automatic Microsoft Updates must be enabled on all approved workstations.

    • Security patches must be applied within 48 hours of release.

7. Data Classification & Handling
  1. Prohibition of Local Storage

    Storing company or client data on the following is strictly prohibited:

    • Local hard drives

    • Personal laptops

    • External storage devices (USBs, portable drives)

    All work must be performed and stored only within approved cloud environments or secure company servers.

  2. Data Classification

    • Information is classified as: - Public - Internal - Confidential - Highly Confidential

    • Access is granted strictly on a Need-to-Know and role-based basis.

8. Continuous Learning & Mandatory Seminars
  1. Attendance at all company-mandated security seminars, workshops, and awareness sessions is compulsory.

  2. Personnel unable to attend must:

    • View the session recording, and

    • Submit a written summary to HR

This is required to maintain active security clearance.

9. Personnel Offboarding & Exit Clearance
  1. Access Revocation

    • All system access (Email, VPN, Cloud Services, Secure Vaults, Internal Tools) will be revoked within 24 hours of the individual’s last working day.

  2. Mandatory Exit Declaration

    Before separation, all individuals must sign a Security Exit Clearance Form confirming: - No company or client data has been retained, copied, or transferred - All temporary files, caches, and local data (if any) have been permanently cleared

10. Incident Reporting

All personnel must immediately report any suspected or actual: - Data breaches - Phishing or social engineering attempts - Malware infections - Lost or stolen devices

Reports must be submitted without delay to HR and the Director.

11. Roles & Responsibilities
  1. Director

    • Provides strategic oversight and ensures consultation with External Security Advisors.

  2. HR Department

    • Manages training distribution

    • Tracks assessments and certifications

    • Maintains compliance records

    • Oversees exit clearances

  3. All Personnel

    • Comply with this policy

    • Safeguard credentials

    • Follow secure data-handling practices

    • Adhere strictly to the No Local Storage requirement

12. Compliance & Enforcement

Failure to comply with this policy may result in: - Suspension or revocation of system access - Disciplinary action - Termination of employment or contract - Legal action where applicable

13. Vendor & Third-Party Risk Management Policy

All vendors, partners, contractors, and third parties who access Gunav Technologies’ systems, networks, or information assets must comply with company-defined security requirements.

  1. Mandatory Requirements

    • Third parties must access systems strictly on a need-to-know basis

    • Access must be approved, documented, and time-bound

    • Security obligations must be contractually enforced through agreements or NDAs

Any third party found violating security requirements may have access immediately revoked and may be subject to contractual penalties or termination.

14. Access Control & Password Management Policy

Access to company systems, applications, and data shall be strictly controlled and formally authorized.

  1. Access Control

    • Access rights must be role-based and approved by management

    • Privileged access shall be limited to authorized personnel only

    • Access must be reviewed periodically and revoked upon role change or exit

  2. Password & Authentication Controls

    • Strong authentication mechanisms must be used at all times

    • Password sharing outside approved secure vaults is strictly prohibited

    • Compromised credentials must be reported and reset immediately

Violation of access control rules will result in immediate disciplinary action.

15. Business Continuity & Disaster Recovery Policy

Gunav Technologies shall maintain documented and tested Business Continuity and Disaster Recovery controls to ensure uninterrupted operations.

  1. Mandatory Controls

    • Critical systems and data must be backed up regularly

    • Recovery procedures must be documented and periodically tested

    • Personnel must follow defined recovery instructions during incidents

Failure to adhere to continuity or recovery procedures during incidents will be treated as a policy violation.


16. Data Privacy & Data Protection Policy

All personal, sensitive, and confidential information handled by Gunav Technologies must be processed in accordance with applicable data protection and privacy laws.

  1. Mandatory Data Protection Rules

    • Personal data must be accessed only for authorized business purposes

    • Data must be protected against unauthorized access, disclosure, or misuse

    • Personnel must follow approved data handling, retention, and disposal procedures

Any misuse or unauthorized disclosure of personal data may lead to disciplinary and legal consequences.


17. Information Security Incident Response Policy

All information security incidents must be identified, reported, and managed immediately in accordance with company-defined incident response procedures.

  1. Incident Handling Requirements

    • Suspected or confirmed incidents must be reported without delay

    • Personnel must cooperate fully during investigations

    • Unauthorized attempts to conceal or delay reporting are strictly prohibited

Failure to report or properly respond to incidents will be considered a serious breach of this policy.