IT Policy

Information Technology (IT) Policy

PERTIN ARMS recognizes information and information systems as critical organizational assets and is committed to ensuring their confidentiality, integrity, and availability.

The organization shall:

  • Establish and maintain controlled access to IT systems and data

  • Protect information from unauthorized access, alteration, loss, or disclosure

  • Ensure secure operation of hardware, software, and network infrastructure

  • Implement appropriate cybersecurity controls and backup mechanisms

  • Monitor, review, and update IT controls to address emerging risks

All employees, contractors, and authorized users are required to comply with defined IT usage and information security requirements. Non-compliance may result in corrective action as per organizational procedures.