Version 2.0. Last updated 2025-09-23.
This Information Security Policy defines how Connectel AB manages information security across its organization. Its purpose is to demonstrate the company’s commitment to protecting confidentiality, integrity, and availability of information assets.
The purpose of this policy is to:
This policy applies to:
Connectel is a CPaaS (Communication Platform as a Service) company, and information processing is fundamental to its operations. Protecting the security of information is critical to achieving business objectives, maintaining compliance, and sustaining customer trust.
Top management fully supports the implementation and continual improvement of the ISMS. Adequate resources are allocated to achieve security objectives and foster a strong security culture.
Connectel promotes a culture of information security awareness, ensuring employees understand risks and their responsibilities.
Access and privileges are assigned based on the principle of least privilege, in accordance with internal policies for access control and privileges.
All new information systems and assets must be reviewed and approved by internal processes and procedures before use.
Connectel maintains tested continuity and recovery plans to ensure resilience in the event of disruptions.
All changes to systems, applications, or assets require review and approval by internal processes and procedures before production deployment.
All confidential and sensitive information must be protected using strong encryption whenever it is stored (at rest) or transmitted over any network (in transit). Encryption methods and key management practices must comply with the organization’s Cryptography Policy, ensuring that data remains secure against unauthorized access, interception, or disclosure throughout its lifecycle.
Connectel recognizes that mobile devices, including laptops, tablets, and smartphones, are essential tools for employees and contractors. To ensure the confidentiality, integrity, and availability of information processed or stored on these devices, Connectel has established internal procedures and policies that govern their secure use.
These procedures and policies include:
All employees, contractors, and other authorized users are required to follow these procedures and policies. Non-compliance may result in disciplinary action and could compromise Connectel’s ability to protect its information assets.
All security incidents, including suspected breaches, vulnerabilities, or any unauthorized access to information or systems, must be reported immediately through the established reporting channels. Once reported, each incident will be formally assessed, investigated, and managed according to the organization’s Incident Response Procedure.
Information is classified based on risk assessment to determine appropriate handling and protection measures.
Risks are identified, assessed, and assigned ownership following the Risk Assessment Procedure. Risk reviews are conducted continuously.
All employees, consultants, customers, and vendors must sign NDAs before exchanging sensitive information.
Connectel ensures that both network and physical access to information systems and assets are restricted, monitored, and controlled to protect the confidentiality, integrity, and availability of information.
Key requirements include:
Employees receive ongoing training to ensure understanding and compliance with information security policies.
Connectel ensures that all vendors, suppliers, and cloud infrastructure providers meet the organization’s information security requirements before being allowed to process or store company information.
All vendors and cloud providers are assessed for security, operational practices, and compliance with relevant laws and regulations. Contracts include clear obligations for confidentiality, access control, and data protection.
Cloud providers must demonstrate secure management of their services, and responsibilities for security controls are clearly defined between Connectel and the provider. Risks related to vendors and cloud services are continuously monitored, and reassessments are conducted periodically.
Procedures are in place for the secure onboarding, management, and decommissioning of all vendors and cloud providers to ensure that information remains protected throughout the relationship.