Information security

 

Information security at Kali

Computerized information systems are a pivotal, key component of the company’s organizational infrastructure and support its business activity. The company’s information systems, data and computerized information form a vital asset which must be protected against exposures and/or damages which could be detrimental to the company’s goals, objectives and ongoing management or to the privacy of the information’s subjects.

We at Kali Group ascribe great importance to protecting the privacy of our customers and employees.

We expend considerable resources on information security management, so that our systems comply with all standardization sections and with the required regulation as regards information security, protection of privacy and protection of sensitive information.

The company, being a ‘holder’ of databases as such term is defined in the Protection of Privacy Law, takes action in connection with the databases of which it is deemed a ‘holder’ within the framework of its provision of its services to its customers.

 

To read Kali’s full information security policy document >>

 

 

ISO 27001 – This year, Kali Group has successfully completed its qualification for the ISO27001 international security standard. The security standard is implemented on the company’s management systems. The standard was adopted out of a commitment to protect the privacy of our customers’ information.

 

What is the ISO 27001 standard?

ISO27001 is an international standard for information security management. The standard was originally published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).

It is an international standard concerned with information security management, and serves as a model for the construction, implementation, operation, monitoring, review, maintenance and enhancement of the information security management system, managing the security of assets such as financial information, intellectual property, employee information, customer information or information provided to a third party, and its purpose is to help us make out information assets more secure.