Policy Effective Date: January 1, 2022
The Chargy Network Inc. ("Company") is committed to safeguarding the confidentiality of all access and application assets available and to complying with the current laws, regulations, guidelines, and best practices to protect its employees, stakeholders, officers, affiliates, and shareholders from the dangers of the cyber world due to its technological advances that include cybercriminals who engage in various types of cybercrime such as phishing, data leakage, inside job or threat, unethical hacking, and ransomware.
This policy was written to provide a security framework to all bonafide employees, stakeholders, officers, affiliates, and shareholders of The Chargy Network Inc. that will ensure protection from unauthorized access, loss or damage while supporting the information exchange that usually happens while accessing the internet that may be vulnerable to all of the above-mentioned dangers of the cyber world.
Failure to act in accordance with this policy may subject its employees, stakeholders, officers, affiliates, and shareholders to disciplinary actions, potential penalties, or, worse, termination of the contract.
Also known as Information Technology Security refers to the practice of protecting the computer, hardware, software, servers, mobile devices, electronic systems, and data from malicious attacks that will compromise the efficiency of the Company to safeguard the confidentiality and integrity of all the access and applications.
Refers to the use of computers and the internet to access and exchange all kinds of information.
Refers to the person who tries to gain access to a certain application or information without proper consent or permission from an authorized user or Company.
Refers to an unethical activity that involves computers and a network that is commissioned to commit an online crime with the sole purpose of harming someone or a company’s security, especially its financial health.
Refers to an individual or group of people that engage in cybercrime.
Refers to a fraudulent activity that masks itself as an official and reputable entity in all forms of communication. These cybercriminals, for example, will send an email in a seemingly official update from the bank through its distributed attachments and links that will help them gain access, should it be successfully filled out, by the victim’s account.
Refers to a type of malware (“malicious software”) that blocks and locks the user from accessing its application or files, usually happens in the Company or an organization setting, that unblocks and unlocks the user once the cybercriminals received the payment.
The Chargy Network Inc. will provide Cyber Security training for its bonafide employees, stakeholders, officers, affiliates, and shareholders to help them discern all their activities that involve networks, computers, and the use of the internet for their safety as well as the Company’s.
The Cyber Security Training and Awareness may involve the following topics:
1. How to Recognize Phishing Attacks
2. Unique Passwords and Authentications
3. The Proper Use of Removable Media
4. Devices Security: Mobile, Laptops, and Computers
5. Working Remotely and Security at Home
6. The Dangers of Public Wi-Fi
7. Physical Security Within and Outside the Premises of the Company
8. Social Media
All subjects – bonafide employees, stakeholders, officers, affiliates, and shareholders – must be cyber security aware and informed by attending all training and certification as well as compliant with the process and procedures of the Company. All subjects are required to do the following:
1. All devices provided by the Company are strictly for business use only to avoid any possible access opening from the outside network. It is provided for the sole purpose of the performance of your role to the Company and its Clients.
2. Properly sign out of the systems and devices after office hours.
3. Login credentials, especially the passwords to different systems and databases, should be stored in the secured password manager system as prescribed by the Company.
4. Lock computer or laptop devices when the personnel is not in their respective workplace or work area.
5. Avoid sharing any company data or information, especially with the person/s that is not in the company circle or in the business to know.
6. Always be vigilant in your surrounding area outside the premises of the company in order to protect yourself, your essential belongings, your mobile, and your laptop devices. The company information may be important, but the subject itself is more valuable than any assets available.
7. It is strictly implemented that all subjects must adhere never try to connect to any public Wi-Fi – anytime and anywhere; in malls, fast food chains, coffee shops, and any other places with a high risk of a security breach.
8. Always be in the cyber security mindset.
The Policy Review will be done every year from the Policy Effective Date and will be carefully deliberated to keep up with the latest updates, changes, and innovations within the Cyber World.