{"id":29273,"date":"2025-01-03T14:07:34","date_gmt":"2025-01-03T12:07:34","guid":{"rendered":"https:\/\/thinkingportfolio.com\/?page_id=29273"},"modified":"2025-01-03T14:07:34","modified_gmt":"2025-01-03T12:07:34","slug":"tietoturvapolitiikka","status":"publish","type":"page","link":"https:\/\/thinkingportfolio.com\/tietoturvapolitiikka\/","title":{"rendered":"Tietoturvapolitiikka"},"content":{"rendered":"
<\/p>\n
This information security policy describes the\u00a0objectives, guidelines, and responsibilities for the information security of Thinking Portfolio Oy. Information security refers to ensuring the confidentiality, integrity, and availability of information, regardless of its form\u00a0or\u00a0how it is presented.<\/p>\n
Thinking Portfolio Oy is committed to continuously improving information security in a risk-based approach. The information security policy and the appropriateness of the information security management system are evaluated annually by the company’s board.<\/p>\n
The information security policy and its\u2019 realization are crucial for the long-term success of Thinking\u00a0Portfolio,\u00a0and it aligns strongly with our values.\u00a0Its\u2019\u00a0objective\u00a0is to ensure continuity of operations in all circumstances.\u00a0Our customers trust their confidential information to us for processing, and\u00a0maintaining\u00a0this trust is essential for us.<\/p>\n
We\u00a0identify\u00a0our customers’ expectations,\u00a0agreements, law-based obligations, and factors that affect the provision of secure services. Our employees and\u00a0partner organizations employees\u00a0are committed to\u00a0complying with\u00a0our information security policy and related policies and guidelines.<\/p>\n
<\/p>\n
This policy defines the basic requirements for information security and creates the basis for planning and implementing activities in accordance with the policy. More detailed guidelines are defined to support the implementation of different areas of information security.<\/p>\n
The information security policy is approved by the company’s board, and its implementation is the responsibility of the CEO, with the support of the information security officer and the data protection officer.<\/p>\n
Information security has its own steering group, which ensures the adequacy, implementation, and development of the management system.<\/p>\n
All\u00a0our employees and\u00a0partner organizations employees\u00a0are committed to promoting information security\u00a0in accordance with\u00a0these guidelines and promptly responding to any information security deviations.<\/p>\n
<\/p>\n
Risk management is a key approach through which we\u00a0identify\u00a0areas for improvement and promote information security. Risk assessment is carried out regularly and in connection with significant changes.<\/p>\n
Risk assessment, identification and monitoring of deviations, and the general situational awareness\u00a0provide\u00a0necessary input for continuous improvement.<\/p>\n
We are familiar with the content of the information we handle. Information is classified based on its information security requirements, which in turn guides its handling.<\/p>\n
We\u00a0monitor\u00a0current issues related to information security and train our staff on role-based topics, current phenomena, and general information security matters.<\/p>\n
Our staff is\u00a0obligated\u00a0to report security incidents. Dealing with information security incidents ensures the generation of necessary documentation, fulfilment of reporting obligations, and\u00a0facilitates\u00a0development and learning.<\/p>\n
Application development is carried out according to a documented procedure, that is regularly reviewed and revised. Third-party audits,\u00a0conducted at least annually,\u00a0are our way of ensuring the reliability of the process.<\/p>\n","protected":false},"excerpt":{"rendered":"
Thinking Portfolio Information Security Policy Introduction This information security policy describes the\u00a0objectives, guidelines, and responsibilities for the information security of Thinking Portfolio Oy. Information security refers to ensuring the confidentiality, integrity, and availability of information, regardless of its form\u00a0or\u00a0how it is presented. Thinking Portfolio Oy is committed to continuously improving information security in a risk-based approach. The information security policy and the appropriateness of the information security management system are evaluated annually by the […]<\/p>\n","protected":false},"author":44,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-29273","page","type-page","status-publish","hentry"],"lang":"fi","translations":{"fi":29273,"en":29278,"sv":29281,"nl":29283},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/pages\/29273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/comments?post=29273"}],"version-history":[{"count":1,"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/pages\/29273\/revisions"}],"predecessor-version":[{"id":29274,"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/pages\/29273\/revisions\/29274"}],"wp:attachment":[{"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/media?parent=29273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/categories?post=29273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thinkingportfolio.com\/wp-json\/wp\/v2\/tags?post=29273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}