Information Security Policy

Version 1..0

10.11.2025

| History Log Date

Author
Version Date Author
Version 1.0 Nov 2025 Kemfinity S.R.O

Contents

  1. Introduction............................................................................................................................... 3
  2. Information Security Policy Coverage........................................................................................... 3
  3. Policy Dissemination ................................................................................................................. 3
  4. Risk Assessment ........................................................................................................................ 4
  5. Information Security Policy Review.............................................................................................. 4
  6. Information Security Policy Responsibilities................................................................................. 4
  7. Formal Security Awareness Program............................................................................................ 4
  8. Formal Acknowledgement Information Security Policies ............................................................. 5
  9. Employee Screening and Background Checks............................................................................... 5
  10. Third Party Service Provider Contractual Requirements............................................................ 5
  11. Connected Entity Requirements.............................................................................................. 5
  12. Asset Classification.................................................................................................................. 6
  13. Roles and Responsibilities ...................................................................................................... 8
  14. User Access.......................................................................................................................... 10
  15. User registration and de-registration (Creation & Deletion)..................................................... 10