Effective Date: FEBRUARY 7, 2025.
At Regnum Commodity Group, we prioritize the confidentiality, integrity, and availability of our business and customer data. Our Information Security Policy outlines our approach to safeguarding sensitive information and mitigating cybersecurity risks.
- Security Objectives
- To protect corporate and customer data from unauthorized access, misuse, or breaches.
- To ensure compliance with applicable data protection and cybersecurity regulations.
- To maintain operational resilience through robust security practices.
- Security Measures
- Access Control: Restricted access to sensitive data based on employee roles and responsibilities.
- Data Encryption: Secure encryption protocols to protect data during transmission and storage.
- Incident Response: A structured protocol for detecting, reporting, and responding to security threats.
- Regular Audits: Periodic security assessments to identify vulnerabilities and strengthen our defences.
- Employee Training: Comprehensive cybersecurity awareness programs for all staff.
- Compliance and Monitoring
- We conduct routine security audits and penetration testing to detect potential risks.
- Employees and third-party vendors must adhere to strict security guidelines.
- Any breaches or suspected vulnerabilities must be reported immediately to our IT security team.
For security concerns or inquiries, contact us at privacy@theregnumgroup.com