Information Security Policy Statement
Introduction
IXOLUTION designs, develops, implements, maintains and hosts software for international and intermodal transport. IXOLUTION has its headquarters in Zwijndrecht (NL).
Mission
As IXOLUTION, we always put our customers first. That is what we promise. With IXSuite, we serve a large and growing number of European logistics service providers. Reliability and flexibility are core values of the IXOLUTlON software. If that basis is present, then there is room for insight, flexibility, a higher service level and innovative additional services.
It is our mission to let customers perform as well as possible with the help of clear, smart and effective transport management software. We do not like to boast. We prefer to refer to our ambassadors: a growing group of satisfied logistics entrepreneurs.
Vision
IXOLUTION chooses applications based on open standards when developing logistics software. This vision means that our customers can integrate TMS and TOS software more easily with systems of chain partners. After all, a smooth exchange of data is a core condition for chain insight.
Purposes
The goal of Information Security is to ensure business continuity and minimize business damage by preventing and minimizing the impact of security incidents. In particular, information assets must be protected to ensure:
- Confidentiality, i.e. protection against unauthorized disclosure
Integrity, i.e. protection against unauthorized or accidental modification
- Integrity, i.e. protection against unauthorized or accidental modification.
- Availability where and when needed to achieve business objectives.
Responsibilities
The Board of Directors has approved this Information Security Policy;.
- The Information Security Manager has day-to-day responsibility for and liaison with external organisations for compliance with legal requirements, including data protection.
- All employees or service providers on behalf of the organisation have a duty to protect the assets, including locations, hardware, software, systems or information, under their control and to report any suspected breach of security immediately.
- Adherence to information security procedures as set out in the policy and guidance documents is accepted as part of the organisation's standard operating procedures. Failure to comply will result in disciplinary action.
- All legal and regulatory requirements are met and regularly monitored for changes.
- A business continuity plan is in place. This is maintained, tested and regularly reviewed.
- This information security policy is regularly reviewed and may be amended by the Information Security Manager to ensure continued viability, applicability and compliance with legislation and to continually improve the information security systems.
- The management ensures that applicable laws and regulations are complied with and that continuous improvement is achieved within the organization through the Information Security Management System.