Information Technology / Information Security Policy
1. Introduction
This Policy shall be termed as IT Framework and security Policy of Moneygear Fintech Private Limited (“The Company” or “MoneyGear”). The terms in this policy shall be considered as defined by the Reserve Bank of India in its Master Direction on NBFC-Scale Based Regulation, 2023 DoR.FIN.REC.No. 45/03.10.119/2023-24 dated Oct 19, 2023.
These Guidelines aim to enhance safety, security, efficiency in processes leading to benefits for NBFCs and their customers. NBFCs, pursuant to these Guidelines, are required to conduct a formal gap analysis between their present status and stipulations as set out in the Guidelines and put in place a time-bound action plan to address the gap.
This IT Framework falls within the scope of Section B of the Guidelines i.e. NBFCs with asset size of below INR 500 crores (Indian Rupees Five Hundred Crores only).
IT governance is an integral part of the corporate governance of MoneyGear and effective IT governance is the responsibility of the Board of Directors of MoneyGear (“Board”) and its Executive Management.
MoneyGear Designated a Senior level executive as the Chief Technical Officer (CTO) who is heading the complete IT department and responsible for the effective implementation of ITPolicy involving IT strategy, value delivery, risk management, and IT resource management. To ensure technical competence, periodic assessments should be formulated to ensure that sufficient, competent, and capable human resources are available. The board of directors exercises oversight over the Chief Technical Officer (CTO).The CTO will also ensure implementation of this IT Framework which, inter alia, includes:
- Security aspects
- User Role
- Information Security and Cyber Security
- Business Continuity Planning policy
- Back-up Data
For the purpose of effective implementation of this IT Framework, the CTO shall ensure technical competence at senior/middle level management of MoneyGear. The CTO is also responsible for periodic assessment of the IT training requirements to ensure the availability of sufficient, competent and capable human resources in MoneyGear.
6. Arrangement for Backup Data
1. By regular backups, data will be protected.Appropriate IT team will perform backup for responsible data. All backup data will be stored in an encrypted manner and backup copies will be stored in an environmentally protected and access controlled secure location. Stored copies will be stored with a short description that includes the following information:
- Backup date / Resource name / type of backup method.
- Stored copies shall be made available upon authorised request:
The request for stored data shall be approved by an authorised person nominated by a Director/Manager in the appropriate department
2. Requests for stored data will include:
- Completion of a form that outlines the specifics of the request, including what copy is being requested, where and when the requester would like it delivered and why they are requesting the copy.
- Acknowledgment that the backup copy will be returned or destroyed promptly upon completion of its use.
- Submission of a return receipt as evidence that the backup copy has been returned.
- A record of the physical and logical movements of all backup copies shall be maintained. Physical and logical movement of backup copies shall refer to:
- The initial backup copy and its transit to storage.
- Any movement of backup copies from their storage location to another location.
- The record of physical and logical movements of backup media shall include.
- All identification information relating to the requested copies.
- Purpose of the request.
- The person requesting the copy.
- Authorization for the request.
- Where the copy will be held while it is out of storage.
- When the copy was released from storage.
- When the copy will be returned to storage.
- Media in transit and store shall be protected from unauthorised access, misuse or corruption, including sufficient protection to avoid any physical damage arising during transit and store. All personnel responsible for data backup processing shall have:
- Relevant identification.
- Relevant authorization.
- All relevant department backups shall be verified periodically and report on its ability to recover data. On a daily basis, information generated from each backup job will be reviewed for the following purposes:
- To check for and correct errors.
- To monitor the duration of the backup job.
- To optimise backup performance where possible.
- The IT team will identify problems and take corrective action to reduce any risks associated with failed backups.
9. Confidentiality / Non-Disclosure Agreements
This Policy has been prepared and implemented to ensure that all the users and staff are aware of their responsibilities towards the IT Resources of MONEYGEAR. It details the end users of their responsibilities and the acceptable use of the IT Resources.
9.1. Human Resources Security Policy
1. Prior to Employment
Personnel Screening
- At the time of job applications verification checks should include the following:
- Proof of the person’s identity (e.g.passport)
- Proof of their academic qualifications (e.g.certificates)
- Proof of their work experience (e.g.résumé/CV and references)
- Criminal record check.
- Credit check.
- In the case of third parties, a similar screening process should be carried out. In case contractors and temporary staff are provided through an agency the contract with the agency should clearly specify the agency’s responsibility for screening and notification procedures they need to follow if screening has not been completed or if the results give cause of doubt or concern.
- Authorization given to access sensitive systems by new and inexperienced staff should be supervised and management should evaluate this process.
2. Terms and Conditions of Employment
Terms and conditions of employment should include:
- Information security related roles and responsibilities
- Legal responsibilities and rights, e.g. regarding copyright laws and should be clarified within the terms and conditions of employment.
- Indemnification clause against any loss, claim or damage to a third party caused by the employee.
- Responsibility for classification and management of data.
- It should state that these responsibilities are extended outside the organisation’s premises and outside normal working hours, e.g. in case of home working.
- Roles and responsibilities related to information security should be documented in job descriptions and definitions. It should include:
- Any general responsibilities for implementing or maintaining the Information Security policy.
- Any specific responsibilities for the protection of particular assets.
- Any specific responsibilities for the protection of particular security processesor activities.
- All employees shall sign Confidentiality / Non-DisclosureAgreements at the time of joining.
3. During Employment
Management Responsibilities:
- Ensure that all users are properly briefed on their information security roles and responsibilities prior to being granted access to sensitive information or information systems.
- Provide guidelines to state security expectations of their role within the organisation.
- Ensure that the employees, contractors and third-party users conform to the terms and conditions of their employment / agreement.
- Ensure that all employees with information security responsibilities continue to have appropriate skills and qualifications.
4. Information Security awareness, education and training
- Training programs should be conducted to make users aware of new security threats. Periodic training calendar should be maintained.
- Employees should also be issued alerts whenever required through emails by the IT Team.
- Copies of training and security education related manuals should be made available to all the employees.
- Users should be fully trained in the correct use of IT facilities like logon procedures, use of software packages etc.
- User training should include the following:
- Reporting security incidents
- Virus protection controls
- Physical access
- Internet usage
- Email usage
- Password usage
- File sharing
- Remote access
5. Disciplinary Process
- There should be a formal disciplinary process for employees who have committed a security breach subject to prior verification that a security breach has indeed occurred.
- The formal disciplinary process should ensure correct and fair treatment for employees who are suspected of committing breaches of security.
- The formal disciplinary process should provide for a response that takes into consideration factors such as the nature and gravity of the breach and its impact on business, whether or not this is a first or repeat offence, whether or not the violator was properly trained, relevant legislation, business contracts and other factors as required.
- In serious cases of misconduct, the process should allow for instant removal of duties, access rights and privileges, and for immediate escorting out of the site, if necessary.
6. Termination or Change of Employment
Terminations and Job Changes
- The communication of termination responsibilities should include ongoing security requirements and legal responsibilities and, where appropriate, responsibilities contained within any confidentiality agreement and the terms and conditions of employment continuing for a defined period after the end of the employee’s, contractor’s or third-party user’s employment.
- The Human Resources function is generally responsible for the overall termination process and works together with the supervising manager of the person leaving to manage the security aspects of the relevant procedures.
Return of Assets
- Upon receiving communication from HR Department about terminations or job changes, IT Team shall ensure that:
- All assets (hardware, software assigned to the employee) are returned, including policy and procedure manuals and technical documentation.
- Keys, passes and other access devices are returned.
- IT shall intimate to the HR Department through mail or any other mode of written communication that all access devices and keys have been returned.
Removal of Access Rights
- In case of terminations, IT shall ensure that access to information systems is revoked by deactivation or deletion of the person’s access identifiers and the removal of the access authorities granted to them.
- In case of job changes, IT shall modify rights of the employee in line with the access control policy.
- IT shall send communication of removal of access rights to HR Department.
9.2. Third Party Confidentiality or Non-Disclosure Agreements
- Third Party operations and work involving access to organizational information processing facilities should be based on formal contract specifying compliance with all information security controls through confidentiality or non-disclosure agreements.
- Confidentiality or non-disclosure agreements should include:
- General policy on information security - i.e.the Third-party is bound by the principles of MoneyGear’s InformationSecurity policy.
- Involvement by the third party or subcontractors and other participants.
- The right to audit contractual responsibilities.
- Notice, notification and other conditions for termination of contracts.
- A description of each IT service to be made available.
- Times and dates when the service is to be made available - Service Level Agreements (SLAs) (including contingency arrangements, if appropriate.
- The respective liabilities of the parties to the agreement.
- Responsibilities regarding hardware and software installation and maintenance.
- Responsibilities with respect to legal matters e.g. data protection, copyright legislation.
- Restrictions on copying and disclosing information.
- Procedures regarding protection of MoneyGear’s assets.
- Measures to ensure the return and processing of information and other assets at the end of the contract.
- The authorisation process for user access.
- The right to monitor and revoke user access.
- A requirement to maintain a list of individuals authorised to use the service.
- Permitted access methods and the control and use of user identifiers and passwords.
- Measures to provide protection against the spread of computer viruses.
- Any required physical protection measures.
- User training in methods, procedures and security.
- Arrangements and responsibilities for reporting and investigating security incidents.
- Mechanisms to ensure that security measures are followed.
- Each third-party employee shall sign the Confidentiality and Non-Disclosure agreements, which shall be kept in a file by the ISM.
- Third-party employees are responsible for immediately informing the manager responsible for the contract, of any security breaches, including unauthorized access to or compromise of the data or information technology resources of MoneyGear. However, any MoneyGear employee who is aware of security violations by vendors shall also report them to the concerned information owner as well as security administrator.