Information security policy

UAB “Adwisery” Information Security Policy

  1. The Information Security Policy (hereinafter referred to as the Policy) is the main document of UAB “Adwisery” (hereinafter Adwisery) Information Security Management System (ISMS), intended to define the principles of Adwisery’s information security management, set effective directions for security assurance, manage information security risks, and ensure compliance with legal acts. Parts of the Policy and ISMS documents may be made available to parties related to Adwisery information in an accessible and understandable form.
  2. The purpose of the Policy is to present Adwisery’s management position on information security and to protect all verbal, written, and electronic information received, sent, created, managed, and used by Adwisery (hereinafter Information) from all possible threats: external, internal, intentional, or accidental, which may impact Adwisery’s operations and reputation.
  3. Legal acts and standards followed in implementing ISMS:
    1. Law on Cyber Security of the Republic of Lithuania;
    2. Resolution No. 818 of the Government of the Republic of Lithuania of August 13, 2018 “On the Implementation of the Law on Cyber Security”;
    3. Order No. V941 of the Minister of National Defence of the Republic of Lithuania of December 4, 2020 “On the Approval of the Methodology for Assessing IT Security Compliance”;
    4. Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation);
    5. Lithuanian Standard LST ISO/IEC 27001:2022 “Information Security, Cybersecurity and Privacy Protection. Information Security Management Systems. Requirements”;
    6. Lithuanian Standard LST ISO/IEC 27002:2022 “Information Security, Cybersecurity and Privacy Protection. Information Security Controls”;
    7. Other legal acts regulating cybersecurity.
  4. Information is a strategically important asset for Adwisery, and its loss, unlawful alteration, damage, disclosure, or processing interruption may cause disruptions to Adwisery’s operations. Accordingly, this Policy establishes the main guidelines to be followed by all Adwisery employees, contractors, and other related parties working in risk and business continuity management, IT management, information and cybersecurity management, implementation, maintenance, and development of information systems, consulting and training, and in other business processes where information is managed, transferred, or otherwise processed, regardless of its form or storage method.
  5. The Policy applies to all Adwisery business processes where information is managed, transferred, or otherwise processed, regardless of its form or storage method, and includes verbal and written information, information systems, computer networks, physical environment, employees, related parties, partners, contractors, and other individuals working for Adwisery, including employees working for third parties who lawfully process Adwisery information.
  6. The Policy describes Adwisery’s:
    1. Information security management objectives to protect the confidentiality, integrity, and availability of Adwisery and client Information;
    2. Scope of application of ISMS.
  7. Definitions used in the Policy:
    1. Compliance assessment – assessment of IT security compliance with organizational and technical cybersecurity requirements according to the Law on Cyber Security of the Republic of Lithuania and its subordinate legislation;
    2. Physical security measures – technical and electronic means intended to protect information from unlawful acquisition, disclosure, destruction, and to prevent unauthorized access to protected premises or territories, as well as unauthorized viewing of information stored therein, and to help identify unauthorized entries and prevent their actions;
    3. Information and cybersecurity – preserving the confidentiality, integrity, and availability of information;
    4. IS – information system;
    5. Cyber incident – an event that threatens the availability, authenticity, integrity, or confidentiality of stored, transmitted, or processed data or services provided or accessible through networks and IS;
    6. Corrective action – an action taken to eliminate the cause of a detected non-conformity or other undesirable situation;
    7. KSIS – Cybersecurity Information System;
    8. NKSC – National Cyber Security Centre under the Ministry of National Defence;
    9. Risk – potential loss or disruption that may be caused by a cyber incident. Cybersecurity risk is expressed as a combination of the extent of such a loss or disruption and the likelihood of the cyber incident;
    10. Risk assessment – evaluation of information security risk;
    11. Network and information system – an electronic communications network, any device or group of interconnected or related devices where one or more automatically process digital data, or digital data stored, processed, restored, or transmitted by the specified means for management, use, protection, and monitoring purposes.
  8. Adwisery’s information security is based on the following cybersecurity principles:
    1. Non-discrimination of cyberspace – legal provisions apply equally, and the protection of legally protected interests is ensured in both physical and cyberspace;
    2. Cybersecurity risk management – cybersecurity risk management measures must ensure control over regularly assessed risks in Adwisery;
    3. Proportionality of cybersecurity – cybersecurity risk management measures must not restrict Adwisery’s activities more than is necessary to ensure cybersecurity;
    4. Primacy of public interest – cybersecurity risk management measures must primarily ensure the protection of the public interest, but must not fundamentally violate individual users’ or Adwisery’s rights and legitimate interests or disproportionately restrict their freedoms;
    5. Standardization and technological neutrality – when implementing cybersecurity risk management measures, Adwisery is encouraged to follow national, EU, and other international standards and technical specifications for network and IS security, without requiring or favoring any specific technology;
    6. Subsidiarity – Adwisery is responsible for the cybersecurity of networks and IS and the services provided through them. In areas of Adwisery’s exclusive competence, NKSC intervenes only when Adwisery fails to ensure cybersecurity.
  9. When applying legal provisions regulating cybersecurity, all principles outlined in point 8 of the Policy must be considered together, without assigning priority to any one of them in advance.
  10. The implementation of ISMS objectives seeks to achieve the following information security goals:
    1. Ensure and manage information security in alignment with Adwisery’s (strategic) goals;
    2. Ensure and manage compliance with external and internal information security requirements by conducting periodic compliance assessments of ISMS documentation and addressing identified deficiencies;
    3. Ensure resolution of information security breaches and elimination of their causes by implementing an incident management process;
    4. Ensure proper selection and implementation of information security and processing measures through annual risk assessment and execution of the Risk Management Plan;
    5. Ensure the effectiveness of implemented information security measures through internal ISMS audits and management reviews to address ISMS non-conformities and implement improvements;
    6. Ensure the adequacy of business continuity and recovery plans through regular review and testing;
    7. Ensure sufficient human and operational resources for ISMS;
    8. Ensure competence development for employees involved in ISMS management.
  11. Information and cybersecurity encompass three main aspects:
    1. Confidentiality – protection of information from unauthorized disclosure;
    2. Integrity – protection of information from unauthorized or accidental alteration;
    3. Availability – ensuring that information is accessible when needed to properly perform Adwisery’s activities.
  12. Adwisery ISMS certification scope: Risk and business continuity management, IT management, information and cybersecurity management, implementation, maintenance, and development of information systems, consulting, and training organization.
  13. Requirements of interested parties for Adwisery arise from:
    1. International legal acts;
    2. Legal acts of the Republic of Lithuania;
    3. Contracts and agreements.
  14. Adwisery ensures information and cybersecurity by committing to applicable legal requirements and allocating responsibilities for information and cybersecurity.
  15. Information and cybersecurity management in Adwisery is based on risk management. The assessment of information security risks ensures that the information and cybersecurity measures applied in Adwisery activities meet the core objectives of Adwisery operations and information protection.
  16. Adwisery conducts information security risk assessments at least once per year or following significant organizational changes that may impact information and cybersecurity.
  17. Adwisery performs internal ISMS audits together with compliance assessments at least once per year or after significant organizational changes that may impact information and cybersecurity. Adwisery must undergo a compliance assessment at least once every 3 years by certified auditors recognized by international organizations in accordance with the Law on Cyber Security of the Republic of Lithuania.
  18. Adwisery monitors, measures, analyzes, and evaluates ISMS processes and control measures.
  19. Adwisery conducts management review evaluations.
  20. Any violation of the Policy or other ISMS document provisions is considered a cybersecurity incident that may negatively affect Adwisery’s business continuity and damage its public image.
  21. Adwisery employees and third parties who violate ISMS requirements are subject to the enforcement measures provided by the laws of the Republic of Lithuania, Adwisery’s internal legal acts, contracts, agreements, or other legally binding documents.
  22. The Policy and other ISMS documents are reviewed at least once a year and updated as necessary.
  23. Cybersecurity incidents may be reported via email at incidentai@adwisery.eu.