ICT Security Policy
Data protection
 Leading technologies including encryption software is used to protect data and adhering to strict security standards are maintained to prevent unauthorized access.
 Storage Security
 All electronic storage and transmission of personal data are secured and stored with appropriate security technologies.
 
                                                                    
