POLICY

1. Meet expectations by realizing information system security through the implementation of ISO / IEC 27001: 2013 ISMS


2. With a level of security using two-step authentication


3. With high internal access control
 

4. Safe backup and storage