Telia Inmics-Nebula is committed to secure all its customers privacy and provide secure and safe solution. Trustworthy computing under all circumstances is the leading guideline for operations. Telia Inmics-Nebula management board reviews and approves company's information security policy on annual basis.
Telia Inmics-Nebula will always conform to legal requirements and will never sell, share or hand out any sensitive nor personal information of its customer. Data sharing must be explicitly allowed by written consent by the customer. Every subcontractor or supplier has to mandatory sign a non-disclosure agreement and apply to Telia-Inmics Nebula contractual agreement. This agreement state clearly the importance of securing privacy and sensitive information from unauthorized usage. It also states that only authorized and qualified employees can have access to information hosted by Telia Inmics-Nebula.
The fundamental operational security is integral part of the professional skills of all Telia Inmics-Nebula employees. Continues recorded expert and security awareness training is mandatory and periodically reviewed by quality team and external auditors.
Telia Inmics-Nebulas diversity of customers give the company a unique position to understand the security challenges for both small and big organizations. Therefore, Telia Inmics-Nebula applies both automated and manual control to its operations and secures logging of events according to legislative requirement. Telia Inmics-Nebula is committed to pursue the highest grade of trust to its customers. Achieving and maintaining security certificates like ISO 27001 are means to provide transparency for customers about company's high-quality security assurance and continual improvement process.
Telia Inmics-Nebula reports on a regular basis to its management about security statistics and provides its customers 24/7 surveillance and incident management of its information transfer backbone.
Telia Inmics-Nebula maintains internal guidelines for its staff to ensure operational excellence.
Below are some examples of main guidelines and processes:
- Code of conduct
- Password management guideline
- Non-disclosure agreements
- Access management
- Developer Guide
- Project and Portfolio Management
- Change Management
- Risk Management
- Vulnerability Management
- Operations Guidelines
- Protection of Records Guideline
Policies, processes, responsibilities, guidelines, reporting, audits and procedures are reviewed periodically and if necessary updated as part of standard operational duties.