Datar Cancer Genetics

Information Security Management System Policy

The Board and Management of M/S Datar Cancer Genetics Pvt Ltd. MIDC Ambad, Nashik-422010.

ISMS Policy Statement

Datar Cancer Genetics Private Ltd. (DCG) is committed to securing the confidentiality, integrity, and availability of information that aligns with the company’s purpose and objectives. Our Information Security Management System (ISMS) forms the foundation for setting information security goals and ensures the protection of critical data.

DCG is committed to meeting all applicable regulatory, legal, and contractual requirements while continuously improving the ISMS to safeguard against internal, external, deliberate, or accidental threats.

To ensure that the needs and requirements of users are met, DCG shall ensure that:

the regulatory and legislative requirements related to security and confidentiality are met.

  • the integrity, accuracy, and completeness of information is maintained.
  • the business continuity plans are developed, maintained, and tested.
  • all employees receive training to stay informed about information security best practices.
  • incident management process is in place to report and investigate any security breaches or suspected incidents.
  • risks are mitigated to an acceptable level through a risk assessment and investigation procedure.
  • appropriate resources are allocated to implement, operate, and review an effective Information Security Management System.

 

The management acknowledges the need for continual improvement and has introduced various methods to ensure the effectiveness and continual improvement of the processes.

Datar Cancer Genetics Pvt. Ltd. follows a formal disciplinary process for employees who have violated information security policies and procedures.

The organization shall ensure that the review of the Information Security Policy and related documents is performed at least once a year during management review meetings or when significant changes occur to ensure the suitability, adequacy, and effectiveness of the ISMS framework.