1. Introduction

In the business context of VMhost’s (VMH) operations it is recognised that infrastructure and
customer information are vital for its success.
The company recognises confidentiality, integrity and availability of information and information
systems as critical factors ensuring continuous operations.
The company shall establish, maintain and review information security management system (ISMS)
in accordance with the international standard ISO/IEC 27001.

2. Purpose

The purpose of this policy is to:

  • Provide principles for defining and regulating the management of information systems andother information assets,
  • Ensure relevant and accurate information is available to staff members and customers,
  • Ensure VMH’s compliance with relevant regulatory and contractual obligations in protecting confidentiality, integrity and availability,
  • Provide a secure and safe working environment for authorised staff members, contractors and interns,
  • Protect its assets from all relevant threats, internal or external, deliberate or accidental,
  • Ascertain that all staff members, contractors, interns and any other third party understand their responsibility in protecting confidentiality, integrity and availability,
  • Appropriate information security objectives are defined and, where practicable, measured,
  • Appropriate Business Continuity arrangements are in place to counteract interruptions to business activities and these take account of information security;
  • Appropriate Information security education, awareness and training is available to staff and relevant others working on behalf of the company;
  • Breaches of information security, actual or suspected, are reported and investigated through appropriate processes
  • Appropriate access control is maintained and information is protected against unauthorized access.
  • Continual improvement of the information security management system is made as and when appropriate.

3. Information security principles

  • All information shall be adequately classified in accordance with relevant regulatory and/or contractual obligation
  • Information shall be protected from unauthorised access and processing,
  • All authorised users are held responsible for information management and handling,
  • Information shall be provided with the cost effective protection according to its classification level,
  • Security events and incidents shall be reported in accordance with the company’s policy.

4. Compliance, Awareness and Disciplinary Procedure

  • Any security event or incident must be reported immediately,
  • All staff members, contractors, interns shall be informed about the policy and shall acknowledge they had understood the contents of the same


5. Changes To Our Information Security Policy

We may update this privacy policy from time to time inline with legislation or industry developments. We will not explicitly inform you of these changes. Instead, we recommend that you check this page occasionally for any policy changes.

This policy was last reviewed and updated on the 5th August 2020.  Policies are periodically reviewed to ensure compliance with the current compliance environment.