Information Security Management System Policy
The general Information Security Management System (ISMS) policy at Temika is as follows:
- Information is one of the main assets in the business operations carried out by the Company. Therefore, the confidentiality, integrity, and availability of information must be managed to ensure its security.
- The implementation of the Company’s Information Security Management System refers to the ISO/IEC 27001:2022 standard and applicable laws and regulations.
- Top management consistently demonstrates leadership and commitment to implementing the Information Security Management System within the organization.
- The information security policy must be communicated to all employees and relevant third parties through available communication channels so that it is easily understood and complied with.
- The Company will continually strive to enhance awareness, knowledge, and skills related to information security for both internal employees and relevant external parties.
- The Company conducts assessments and manages risks related to information security based on existing vulnerabilities and threats to each asset and process.
- If there are vulnerabilities or threats that have the potential to disrupt information security, all concerned parties are required to report them to the Chief Information Security Officer (CISO) or members of the ISMS Team.
- All leaders at every level are responsible for monitoring and evaluating the effectiveness of this policy’s implementation within their respective units or departments.
- All employees are responsible for maintaining and protecting the security of information assets and complying with the established information security policies and procedures.
- Any violations of this policy or other related policies will be subject to administrative sanctions, such as revocation of information system access rights and/or other disciplinary actions in accordance with applicable regulations.
- The organization is committed to continuously improving the implementation of the Information Security Management System.



