ICT Security Policy
Data protection
Leading technologies including encryption software is used to protect data and adhering to strict security standards are maintained to prevent unauthorized access.
Storage Security
All electronic storage and transmission of personal data are secured and stored with appropriate security technologies.