Professional Documents
Culture Documents
Module 6:
IT Security
Introduction
Transcript
Glossary 6
This policy applies to all traditional and electronic forms of information created, used or maintained by ICICI
Bank.
Access to information will be made available only to the extent necessary to support authorized business
functions.
Information assets, including information systems will be protected in a manner commensurate with their
sensitivity, value and criticality.
Introduction
Transcript
Glossary 6
All employees, agents, third party service providers, vendors, consultants, etc. who have access to the
information assets of ICICI Bank are required to understand and take action to ensure compliance with any
and all specific policies, procedures, standards and guidelines established in support of ICICI Banks
Information Security Policy.
Each manager will be accountable for implementation and enforcement of this policy as it applies to the
information used in the management of the Group or Department.
Noncompliance with this policy will be subject to management investigation and disciplinary action including
without limitation termination of employment.
Learning Objectives
Transcript
Glossary 6