Edgers Information Assurance Policy


Edgersonline’s information assurance policy ensures to decrease the possible threats to personal and corporate information. Information assurance policy works as a minimizer to any information security processes. This policy is applied by every worker of the company. The purpose of the information assurance policy is to protect every information that the company holds, including the users’ personal information. 


All the instructions are defined to preserve the company’s information assurance policy. The policy ensures that the information available on the company is only used by competent authorities, and they are not shared by third parties. The stored information can be later used if needed. In any illegal actions, information assurance policy facilitates legal processes and protects rights. Every worker of the company must follow the information assurance policy instructions. Third parties who can have access to the information are under the obligation of following those instructions.


The company’s stored information is taken under the protection of the information assurance policy. The policy ensures that the protection methods against possible threats to information are constantly being renewed. According to the company policy, the actions made on the website should be regulated by the law.


Legal punishments can be made if the information assurance policy is not complied with by any means. The policy uses blocking methods to protect against the aforementioned threats. It should be known that it is not possible for some information to disappear completely in the internet environment. In order for information assurance policy to function optimally, the users should be aware of their responsibilities and read the policies of the company.


Regardless of the positions and/or the responsibilities, every unit of the company has an obligation to follow the information assurance policy defined by the company. The company expects all units to comply with the following statements:

  • Limiting and minimizing the risk of losing information and/or the bad use of that information.
  • Fully accepting and applying the information assurance policy stated by the company.
  • Controlling and providing integrity within the information, the privacy of the information systems, and the availability of them.
  • Reporting any possible threat to the company to the information assurance manager.
cultureSettings.RegionId: 0 cultureSettings.LanguageCode: EN