Security policy

Your security and privacy are our priority. Teiva Systems is committed to protecting the confidentiality, integrity, and security of any information we collect from you across our website, https://www.teivasystems.com/, and any other platforms we own and operate.

teiva image

1. FRAMEWORK INFORMATION SECURITY POLICY of Teiva Systems UAB

This Framework information security policy (ISP) is a set of guidelines and procedures for protecting Teiva Systems UAB’s (also hereinafter referred to as the “Organization”) information assets from unauthorized access, use, disclosure, disruption, modification, or destruction.

The ISP outlines the roles and responsibilities of personnel as well as the basic technical and organizational measures that should be implemented to safeguard the organization’s information.

This ISP also stipulates the basis of the incident management mechanisms.

2. Roles and Responsibilities of Personnel:

This ISP defines the roles and responsibilities of personnel in relation to information security. This includes management, IT staff, end-users, and other stakeholders.

Roles and responsibilities are clearly communicated to the personnel involved in the respective project, during the pre-employment and/or induction process.

In order to prevent unauthorised processing, copying and transfer of sensitive data of both the organization and its end-users.

Aссess to all confidential data of both the Organization and its counterparts shall be restricted and must be following the rule of leave possible privileges. Access privileges can be granted to Teiva employees and its counterparts based on project specifics and/or a motivated access request. Users should not have privileges to install unauthorized software and deactivate software applications critically important for project specifics (e.g. firewall, antivirus, intrusion detection systems, etc).

3. Basic technical measures

The ISP establishes basic technical measures to be implemented to protect the organization’s information assets.

These measures include:

Teiva obeys the valid sanction measures of the EU and the USA and implements them in its current operational activities.

4. Basic organizational measures

The basic organizational measures to support the technical stability and effectiveness of the organization include:

5. Incident response plan

Incident response refers to the process of identifying, investigating, containing, and mitigating the effects of a security incident or breach.

The goal of incident response is to minimize damage, preserve evidence, and restore normal operations as quickly and effectively as possible.

An incident can include any unexpected or unauthorized activity that impacts confidentiality, integrity, or availability of information or systems. Common examples include network intrusions, malware infections, data breaches, and physical security breaches.

The incident response process typically includes the following stages:

Effective incident response requires a well-defined plan, clear communication channels, and a skilled team with the necessary expertise and resources to respond quickly and effectively to security incidents.

6. Final provisions