Skip to content

Information Security Policy

The purpose of this Information Security Policy is to protect all information within Code Town from unauthorized access, use, disclosure, modification, or destruction. This policy outlines the principles and practices to safeguard the confidentiality, integrity, and availability of Code Town’s information assets.

It applies to all employees, contractors, and third-party Vendors who access or process information on behalf of Code Town.

Code Town is committed to:

  • Protecting information from unauthorized access, disclosure, alteration, or destruction.
  • Maintaining the confidentiality, integrity, and availability of information and information systems.
  • Adhering to all applicable legal, regulatory, and contractual obligations related to information security.
  • Continuously improving the Information Security Management System (ISMS) in response to emerging threats, vulnerabilities, and risks.
  • Assigning and communicating appropriate roles and responsibilities to manage information security across the organization.

Code Town’s information security objectives include:

  • Maintaining customer trust through strong data protection practices.
  • Protecting the confidentiality, integrity, and availability of our information.
  • Meeting our legal, regulatory, and contractual obligations.
  • Identifying and manage information security risks.
  • Supporting business continuity and operational efficiency.

Code Town will implement and maintain organizational controls by:

  • Defining policies and procedures: Establishing and communicating policies (e.g., Acceptable Use Policy, Data Management and Retention Policy) that outline rules and expected behaviors for handling information assets.
  • Risk management: Conducting regular risk assessments to identify and address potential threats to information security.
  • Vendor management: Ensuring that third-party providers comply with contractual security obligations through regular assessments.
  • Compliance with legal and regulatory requirements: Adhering to relevant laws and standards to protect information.
  • Documented procedures: Maintaining clear procedures for security incident management, business continuity, and disaster recovery.

Code Town is committed to protecting information through people-focused controls by:

  • Training and awareness programs: Providing mandatory security awareness training to all employees and contractors to educate them on their security responsibilities and emerging threats.
  • Security in recruitment and onboarding: Conducting pre-employment background checks and ensuring that job descriptions include security-related responsibilities.
  • Incident reporting and response: Educating employees on identifying and reporting security incidents promptly.

Code Town will safeguard its information assets through effective physical controls by:

  • Securing remote workspaces and devices: Employees must secure their workspaces and devices by locking screens when not in use, and ensuring company devices are not left unattended or accessible to unauthorized individuals.
  • Use of secure, approved equipment: Employees are required to use company-issued or approved devices that comply with security policies (e.g., encryption, antivirus), and must protect portable devices from theft or loss.
  • Clear desk and screen policy: Employees must maintain a clear desk and screen policy, ensuring that sensitive information is not visible or accessible, and securely dispose of physical documents when no longer needed.

Code Town will employ technological controls to protect its digital information assets by:

  • Access control and authentication: Enforcing role-based access control (RBAC) and multi-factor authentication (MFA) to restrict access to systems and sensitive data.
  • Data encryption and protection: Encrypting sensitive data at rest and in transit to prevent unauthorized access, along with data loss prevention (DLP) technologies.
  • System hardening and patch management: Applying secure configurations, timely system updates, and regular vulnerability scanning to reduce the risk of compromise.
  • Network and endpoint security: Using firewalls, intrusion detection and prevention systems, and endpoint protection tools to monitor and defend against threats.
  • Monitoring and logging: Implementing logging and monitoring systems to detect and respond to unauthorized activities or system anomalies in real-time.
  • Backup and recovery: Conducting regular backups of critical data and testing recovery procedures to ensure business continuity.

Compliance with this policy is mandatory for all employees, contractors, and third parties with access to Code Town’s data.

In rare cases, business needs, local laws, or regulations may require exceptions. Management will approve any exceptions and define alternative solutions.

Non-compliance may lead to disciplinary action, including termination, as per Code Town’s policies.

This policy will be reviewed annually or when significant changes occur to maintain its continuing suitability, adequacy, and effectiveness.

Reviews must consider changes in the regulatory landscape.