Information security policy
Policy summary
Recroot takes information security seriously. We at Recroot understand that our professionals working for various clients might be provided access to sensitive information. Some of this information may also be regulated under different jurisdictions.
Applicability
This policy applies to all employees and contractors of Recroot. This policy also applies to third party employees working for the organization whether they are explicitly bound (e.g. by contractual terms and conditions) or implicitly bound (e.g. by generally held standards of ethics and acceptable behavior) to comply with our information security policies.
Responsibilities
Recroot Responsibilities
  • Information Security is the shared responsibility of Recroot, clients and candidates. Recroot is responsible for
  1. Establishing and implementing reasonable measures to protect client and candidate information stored within Recroot network
  2. Provide periodic information security awareness training for our staff
  3. Conduct appropriate background checks for our staff
  4. Ensure the staff devices are patched and secured using appropriate anti-virus software
  5. Ensure that third parties employed by Recroot comply with Recroot’s information security policy
Client Responsibilities
Scope of Recroot’s information security measures is limited to Recroot staff having access to client information, securing the infrastructure that hold client information and taking reasonable measures to comply with client’s information security policies. Recroot is not responsible for client’s information security capabilities including the security of the software implemented by the client on staff devices issued by Recroot. Client responsibilities include
  1. Implementing appropriate and reasonable measures to protect their information and personal information belonging to Recroot
  2. Securing the software installed on Recroot staff devices
  3. Clearly articulating their information security policies to Recroot our staff
  4. Complying with appropriate cyber regulations
Detailed policy requirements
  1. Cybersecurity is largely a matter of mitigating cyber-risks through conventional information security controls, especially ICT security controls intended to prevent or mitigate (reduce) cyber-incidents.
  2. While conventional information security controls to prevent or mitigate cyber-incidents take priority, we must not neglect detective and corrective controls since cyber-incidents cannot be entirely negated. We are unlikely to identify and fully comprehend, mitigate or avoid all our cyber-risks in this dynamic area, hence cyber-incidents are almost inevitable.
  3. Detective cybersecurity controls include:
    • • Maintaining a widespread awareness of cybersecurity, coupled with policies and procedures for spotting, reporting and responding effectively and efficiently to possible or confirmed cyber-incidents
    • • Effective IT system and network security monitoring, and responding to indications of possible or actual cyber-incidents as effectively and efficiently as possible;
    • • Management assessing and responding to reports of cyber-risks, cybersecurity events, incidents, suspicions etc. including relevant metrics.
  4. Corrective cybersecurity controls include:
    • • Business continuity management involving the adoption of appropriate resilience, recovery and contingency measures to protect critical business activities, including the associated ICT, against excessive interruptions;
Further information
For any queries on our information security policy or know more, please reach out to us through
Email: privacy@arinnovate.io