What would you like to know more about?

Security Weakness Reporting Policy

Purpose

A successful information security program requires a team effort. Every ACS Technologies Group, Inc. ("ACST") employee and onsite contractor should work to be an asset to ACST information security program. This policy defines responsibilities for reporting any suspected security weaknesses in any ACST facility or system.

Scope and Applicability

This policy applies to all ACST employees, on-site contractors, and any other users of ACST information systems.

Policy

ACST employees must immediately report any observed or suspected security weaknesses in systems or services to their direct supervisor or to the Chief Ventures Officer. Employees should also report perceived security weaknesses per this policy, regardless of whether or not the weakness is verified

Enforcement

Any employee found to have violated this policy may be subject to corrective action, up to and including termination of employment.

Variance Process

The Chief Ventures Officer is responsible for the review, documentation, and management of any and all exceptions to this policy.