Cyber Security Policy

Glossary/Abbreviations

In this Policy, except where the context otherwise demands, the following words and expressions shall have the following meaning:

 

Introduction

Background

Technology and cybersecurity risk management is a crucial element of an organization’s overall operations, and it aligns the organization’s strategic business objectives through addressing the key objectives of protecting the confidentiality, integrity and availability of the information assets supporting the organization’s overall business activities.

Technology and cybersecurity risk management is a crucial element of an organization’s overall operations, and it aligns the organization’s strategic business objectives through addressing the key objectives of protecting the confidentiality, integrity and availability of the information assets supporting the organization’s overall business activities.

Virtual Assets Standards Policy

Virtual Assets Assessment

The Assessment of each virtual asset shall consider certain parameters including but not limited to:

Technology Evaluation

  1. In order to ensure the virtual assets reliability, resilience, security, and capability to perform its intended functions, the Company will undertake a comprehensive technology evaluation.
    This evaluation will include a due diligence of the underlying technical infrastructure, and protocols supporting the virtual assets.
  2. The Company will assess factors such as system reliability, scalability, data integrity and network security. This assessment will also consider the virtual assets compatibility with industry standards and best practices.