Page 73 - Phil Reddin Financial Services Ltd DRAFT V1
P. 73

5. 'Close Periods'

               All staff are prohibited from dealing (or recommending/inducing anyone else to deal) in AIB financial
               instruments (including shares and other securities) in advance of the publishing of its respective annual
               or interim financial results. The publication dates of financial year-end or half year-end results vary
               from year to year and staff should be careful to inform themselves of the publication dates.

               This is called the ‘close period’.


               7.10 EBS INFORMATION SECURITY SUMMARY POLICY
               The EBS Group ("the Group") is committed to protecting information and information systems from
               unauthorized access, use, disclosure, disruption, modification, or destruction. The Group Information
               Security  policy  along  with  the  Information  Security  Procedures  document  aims  to  formalise  and
               document the processes within the Group for information security management.

               Information security, within the Group, is principally concerned with ensuring that:

               •  Information  will  be  protected  against  unauthorised  access.  Employee  authority  to  access
                   information will be limited to the information that they need to fulfil their roles & responsibilities.
                   Employees do not have authority to access information outside of their roles, even should such
                   information be available
               •  Integrity and confidentiality of information will be maintained. All inbound or outbound emails
                   that contain sensitive data must be password protected.
               •  Internet and external email use is provided primarily for business purposes and its use will be
                   monitored.
               •  Information Security regulatory and legislative requirements will be met.
               •  Business continuity plans will be produced, maintained and tested for all areas of the business
               •  A clear desk policy will be maintained. All confidential and restricted information will be securely
                   locked away at the end of each day.
               •  Information security training will be available to all employees
               •  Business requirements for the availability of information and information systems will be met.
               •  Only spokespersons approved by EBS Senior Management may make statements to the media on
                   behalf of the Group.
               •  Staff identity badges and visitor badges are worn visibly at all times inside the EBS buildings.
               •  All breaches of information security, actual or suspected, will be reported to and investigated by
                   the Head of Information Security. Any investigation that shows that a breach of confidentiality has
                   occurred will result in disciplinary action.
               Other security policy documents are developed for specific functions such as internet use; use of
               email; use of EBS hardware, software and network functions etc. These items and more detailed
               descriptions of our policies are contained in the EBS Information Security Standards document which
               supports and qualifies this high-level policy. These are summarised in the Information Security Key
               Policies and Procedures document.

               7.10.1 Responsibilities
               Overall responsibility for managing the information security policy will be performed by the Head of
               Information Security. This includes direct responsibility for maintaining the policy and providing advice
               and guidance on its implementation.




                                                                                             Page 72 of 83
   68   69   70   71   72   73   74   75   76   77   78