GMO-Z.com RUNSYSTEM understands that information security is one of the most important requirements in the management of software enterprises. Therefore, to meet this requirement, GMO-Z.com RUNSYSTEM has issued information security regulations:
GMO-Z.com RUNSYSTEM understands that information security is one of the most important requirements in the management of software enterprises. Therefore, to meet this requirement, GMO-Z.com RUNSYSTEM has issued information security regulations:
100% Employees must sign the confidentiality agreement and contract.
Manage by employee cards and magnetic cards.
Use electronic lock and magnetic card reader for the office. By assigning the access, employees are allowed to enter their place of work only.
Media and data folders access is limited to some employees.
Periodically password change.
Only internal IPs have access to the server of the company.
The programmer can’t access the information of the completed project.
Limit use of personal laptops and external devices and the usage requires registration.
Install surveillance cameras.
Regulations are disseminated by the Board thoroughly to all staffs in the company. Besides, they are also annually reviewed, revised and continually updated to be in line with actual situation of the company.
Discover how our customer successfully digitize their businesses with GMO-Z.com RUNSYSTEM