Security Weakness Reporting Policy
Purpose
A successful information security program requires a team effort. Every ACS Technologies Group, Inc. ("ACST") employee and onsite contractor should work to be an asset to ACST information security program. This policy defines responsibilities for reporting any suspected security weaknesses in any ACST facility or system.
Scope and Applicability
This policy applies to all ACST employees, on-site contractors, and any other users of ACST information systems.
Policy
ACST employees must immediately report any observed or suspected security weaknesses in systems or services to their direct supervisor or to the Chief Ventures Officer. Employees should also report perceived security weaknesses per this policy, regardless of whether or not the weakness is verified
Enforcement
Any employee found to have violated this policy may be subject to corrective action, up to and including termination of employment.
Variance Process
The Chief Ventures Officer is responsible for the review, documentation, and management of any and all exceptions to this policy.