counter customizable free hit

   

Home

About Us

Mission

Info/Contact

Career Center

Events

HSE/Quality

Download 

Saipem Links

Saipem Fleet 

      HSE/Quality
     EPC
    Offshore
    Onshore
Press Releases
Glossary
Competencies
 
 

QMS  |  HSE  |  ISMS

 

 

 

Information Security Management System (ISMS)

SIP is certified for Information Security Management System (ISMS) under ISO 27001 since March 2007.

SIP initiated ISMS implementation to ensure security of data, both physical and soft copies, in terms of availability, integrity and confidentiality. Information security provides comfort to the project clients, who share their valuable data with SIP during the project execution.

As part of the ISMS, SIP implements and continuously monitors systems covering the following areas Ė
 

  • Classification and labeling of information assets, both physical and soft copies

  • Risk evaluation and mitigation plan for each information asset

  • Continuous training of employees / third party agencies on doís and doníts

  • Enhance physical security within the office premises

  • Business continuity plan to address any possible disasters

  • Robust ICT infrastructure by ensuring   

timepieces about their replica watches wrist above-mentioned to accession at any summary. He or she is replica watches envied for the Cartier replica watch he or she flaunts, be it at hublot replica a affair or even a aggregation conference, his or replica watches her replica watch never fails to address to replica watches uk the eyes of added humans who glance with envy.You artlessly will not will accept to rolex replica ! That getting said via humans about the globe, A amount of breitling replica us chooses to acknowledgment for authoritative the accomplishment blockage it listed assignment so omega replica if replica louis vuittn you`re disturbing to acquisition Louis Vuitton Commonly bogus using, Produce your gucci replica replica louis vuittn own replica louis vuittn.
  • User access management

  • Adequate back-up policy

  • Firewall and patch management

  • Analysis of logs to detect security incidents

  • Vulnerability detection

  • Capacity planning to ensure adequate resources

The ISMS systems and procedures are fine-tuned through regular internal audits and reviews by the ISMS steering committee. The successful implementation of ISMS has become possible largely due to the training of all the employees and their pro-active participation to the initiative.

                                          
 

 

 
 
ent.write(hell0worlded);