logo

 Information Security Statement

  • GIG-Jordan ensures that appropriate controls and countermeasures are put in place to protect corporate and client data, as well as the information technology     systems, and services and equipment of GIG-Jordan.
  • GIG-Jordan is committed to protect its information assets, personnel, intellectual property, computer systems, data, and equipment from all threats, whether       internal or external, deliberate or accidental, in a cost-effective manner. This shall be achieved with minimum inconvenience to authorized users and against threats     to the level of service required by the gig-Jordan to conduct its business.
  • GIG-Jordan shall adopt ISO 27001 Information Security Management System (ISMS) as a tool to implement a formal system for protecting the confidentiality,      integrity and availability of information.
  • GIG-Jordan is committed to comply with regulatory and legislative requirements.
  • GIG-Jordan is committed to satisfy the expectations and requirements of the interested parties, and to provide the necessary resources to achieve this.
  • Information security risks shall be managed based on gig’s Jordan approved risk management methodology.
  • GIG-Jordan is committed to treat and resolve security incidents and suspected vulnerabilities per their respective nature.
  • Information security objectives shall be defined based on the implemented risk assessment and shall be monitored and reviewed by the Information Security    Management System Steering Committee.
  • GIG-Jordan is committed to encouraging information security improvements by engaging with its personnel, providing them with information security training and awareness, and enhancing their competences.
  • GIG-Jordan is committed to continually review this policy and its information security performance to ensure it improves over time.