Information Security Policy
Revised Date: October 7th 2025Approved by C.E.O
🔐 Information Security Staff Notice
Welcome to the Protel BPO Information Security page.
Keeping information secure is critical to protecting our company, our clients, and the services we provide. Every employee, contractor, and user plays an important role in maintaining security.
This policy applies to all users of company systems, whether working in the office or remotely.
🛡️ What Information Security Means for You
Information security is about protecting:
- Confidentiality → Only authorized people can access information
- Integrity → Information must be accurate and not altered improperly
- Availability → Systems and data must be available when needed
👤 Your Responsibilities as a User
All users are expected to:
- Follow all company security policies and procedures
- Use systems and data only for authorized business purposes
- Protect your login credentials (username/password)
- Access only the systems and data required for your job
- Review all files and documents before storing, sharing, or sending them
- Ensure sensitive or client information is handled securely
- Report any suspicious activity, security issues, or incidents immediately to IT
📂 Handling Information Properly
You must always:
- Treat company and client information as sensitive
- Avoid storing or sharing data in unauthorized locations
- Ensure information is protected whether:
- On your computer
- In emails
- On paper
- In conversations
🚫 What You Must NOT Do
Users must not:
- Access data or systems without authorization
- Share sensitive or client information improperly
- Copy or store sensitive data outside approved systems
- Attempt to bypass security controls
- Use tools or software that could compromise system security
⚠️ Reporting is Mandatory
If you notice anything suspicious, you must report it immediately, including:
- Possible data exposure
- Unauthorized access
- Malware or unusual system behaviour
- Policy violations
👉 Reporting quickly helps prevent bigger security issues
🖥️ Monitoring and Company Systems
All company systems are:
- Monitored for security and compliance
- Logged and reviewed by the IT team
Users should not expect privacy when using company systems.