Information Security Policy
Document Version: 1.0
Effective Date: 1st January 2025
Owner: ISMS Lead, Easylib Software Pvt. Ltd.
1. Purpose
The purpose of this policy is to protect Easylib Software Pvt. Ltd.'s information assets from all threats, whether internal or external, deliberate or accidental. This policy supports compliance with ISO/IEC 27001:2022 and serves as the foundation of the organization’s Information Security Management System (ISMS).
2. Scope
This policy applies to:
- All Easylib employees, contractors, interns, and third-party partners
- All information systems, networks, applications, and physical locations owned or operated by Easylib
- All business processes that collect, store, process, or transmit data related to Easylib products, including Easylib and EasyOne
3. Policy Statement
Easylib is committed to:
- Ensuring the confidentiality, integrity, and availability of its data and systems
- Meeting legal, regulatory, and contractual obligations
- Managing information security risks through a structured risk management program
- Providing training and awareness for all staff
- Continuously improving the ISMS through reviews and audits
4. Key Principles
- Access Control – Only authorized individuals shall have access to information based on the principle of least privilege.
- Secure Development – Secure coding and vulnerability assessment shall be mandatory for all releases.
- Incident Response – All incidents must be reported and handled through the established incident response plan.
- Backup & Recovery – Business-critical data must be backed up daily and recovery tested at least monthly.
- Vendor Management – All vendors handling Easylib data must sign a data processing agreement and meet security standards.
- Compliance – Adhere to the IT Act 2000, GDPR (if applicable), and any local data privacy laws.
- Audit & Monitoring – Logs shall be maintained and monitored, and internal audits shall be conducted at least semi-annually.
5. Responsibilities
- Top Management: Provide leadership, resources, and commitment to information security.
- ISMS Lead: Oversee policy implementation and review.
- All Employees: Follow security policies and report incidents.
6. Policy Review
This policy is reviewed annually, or whenever significant changes occur to systems, business processes, or applicable laws.
7. Enforcement
Non-compliance with this policy may result in disciplinary action, up to and including termination or legal proceedings.
For questions or clarification, contact the ISMS Team at security@easylib.net