● Protect ISMS information assets against internal or external, deliberate or accidental threats, in order to ensure their confidentiality, integrity and, availability.
● Provide the necessary resources to ensure the implementation of required control measures to prevent information security risks from materializing and the efficiency of the security management system continually improves.
● Comply with the legal and regulatory requirements which affect the organization regarding the information security.
● Establish the necessary guidelines to respond early to business continuity events without affecting the information security in local and / or remote work environments.