I. POLICY BACKGROUND
The [Officer.Company] ("Company") is committed to safeguarding the confidentiality of all access and application assets available and to complying with the current laws, regulations, guidelines, and best practices to protect its (list all who apply, e.g., employees, stakeholders, officers, affiliates, and shareholders) from the dangers of the cyber world due to its technological advances that include cybercriminals who engage in various types of cybercrime such as phishing, data leakage, inside job or threat, unethical hacking, and ransomware.
This policy was written and approved by the Committee on Cyber Security to provide a security framework to all bonafide (list all who apply, e.g., employees, stakeholders, officers, affiliates, and shareholders) of [Officer.Company] that will ensure protection from unauthorized access, loss or damage while supporting the information exchange that usually happens while accessing the internet that may be vulnerable to all of the above-mentioned dangers of the cyber world.
Failure to act in accordance with this policy may subject its (list all who apply, e.g., employees, stakeholders, officers, affiliates, and shareholders) to disciplinary actions, potential penalties, or, worse, termination of the contract.
III. DEFINITION OF TERMS
1. Cyber Security
Also known as Information Technology Security refers to the practice of protecting the computer, hardware, software, servers, mobile devices, electronic systems, and data from malicious attacks that will compromise the efficiency of the Company to safeguard the confidentiality and integrity of all the access and applications.
2. Information Technology
Refers to the use of computers and the internet to access and exchange all kinds of information.