Page 73 - Phil Reddin Financial Services Ltd DRAFT V1
P. 73
5. 'Close Periods'
All staff are prohibited from dealing (or recommending/inducing anyone else to deal) in AIB financial
instruments (including shares and other securities) in advance of the publishing of its respective annual
or interim financial results. The publication dates of financial year-end or half year-end results vary
from year to year and staff should be careful to inform themselves of the publication dates.
This is called the ‘close period’.
7.10 EBS INFORMATION SECURITY SUMMARY POLICY
The EBS Group ("the Group") is committed to protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction. The Group Information
Security policy along with the Information Security Procedures document aims to formalise and
document the processes within the Group for information security management.
Information security, within the Group, is principally concerned with ensuring that:
• Information will be protected against unauthorised access. Employee authority to access
information will be limited to the information that they need to fulfil their roles & responsibilities.
Employees do not have authority to access information outside of their roles, even should such
information be available
• Integrity and confidentiality of information will be maintained. All inbound or outbound emails
that contain sensitive data must be password protected.
• Internet and external email use is provided primarily for business purposes and its use will be
monitored.
• Information Security regulatory and legislative requirements will be met.
• Business continuity plans will be produced, maintained and tested for all areas of the business
• A clear desk policy will be maintained. All confidential and restricted information will be securely
locked away at the end of each day.
• Information security training will be available to all employees
• Business requirements for the availability of information and information systems will be met.
• Only spokespersons approved by EBS Senior Management may make statements to the media on
behalf of the Group.
• Staff identity badges and visitor badges are worn visibly at all times inside the EBS buildings.
• All breaches of information security, actual or suspected, will be reported to and investigated by
the Head of Information Security. Any investigation that shows that a breach of confidentiality has
occurred will result in disciplinary action.
Other security policy documents are developed for specific functions such as internet use; use of
email; use of EBS hardware, software and network functions etc. These items and more detailed
descriptions of our policies are contained in the EBS Information Security Standards document which
supports and qualifies this high-level policy. These are summarised in the Information Security Key
Policies and Procedures document.
7.10.1 Responsibilities
Overall responsibility for managing the information security policy will be performed by the Head of
Information Security. This includes direct responsibility for maintaining the policy and providing advice
and guidance on its implementation.
Page 72 of 83