How does Eye-Able® ensure that employees, external service providers, and other authorized individuals handle information and IT resources responsibly?
Ensuring responsible handling of information and IT resources – especially regarding background checks, access requirements, awareness programs, and workplace security
Eye-Able® has documented HR security policies that fully regulate hiring, access, awareness, and offboarding processes.
Risk-Based Background Checks and Employment Contracts
Before employment begins, a risk-based background check is conducted, based on legal, ethical, and contract-related requirements.
Employees are granted access to systems and information only after signing the relevant employment contracts, which include security clauses and commitments to comply with applicable policies.
For particularly sensitive areas, additional confidentiality agreements apply.
Use of IT Resources and Security-Related Training
The use of company IT resources and work tools is governed by acceptable-use policies, which are regularly reviewed.
Security-related training is mandatory for all employees – initially upon entry and regularly ongoing, especially when there are changes in processes or legal requirements.
Access Rights and Remote Workplaces
Access rights to sensitive data are granted only after completing the relevant awareness measures.
Remote workplaces are subject to the same protection measures as internal offices; this also applies to policies regarding the protection of unattended work environments.
Offboarding Processes and Security Responsibility
Offboarding processes regulate the return of assets, the revocation of access rights, and the confidentiality obligation after employment ends.
The security responsibility of each individual is anchored through clear communication of roles and responsibilities.