Information Security Policy of TXOne Networks

1. Purpose

The purpose of this Information Security Policy is to ensure the protection of TXOne Networks’ information assets against all internal, external, deliberate, or accidental threats. This policy outlines the principles, responsibilities, and practices for managing and securing the company’s information resources.


2. Scope

This policy applies to all employees, contractors, consultants, temporary staff, and other workers at TXOne Networks, including all personnel affiliated with third parties. It covers all information systems, networks, hardware, software, data, and communication devices owned or operated by TXOne Networks.


3. Policy Statement

TXOne Networks is committed to protecting the confidentiality, integrity, and availability of its information assets. To achieve this, TXOne Networks will cover:

  • Identify and Manage Risks: Regularly assess information security risks and implement appropriate measures to mitigate identified risks.
  • Access Control: Ensure that access to information assets is granted based on business needs and in accordance with security principles such as least privilege and need-to-know.
  • Data Protection: Protect information against unauthorized access, disclosure, alteration, and destruction by implementing robust encryption, access controls, and data handling procedures.
  • Incident Management: Establish and maintain an incident response plan to effectively manage and respond to security breaches and incidents.
  • Awareness and Training: Provide regular information security training and awareness programs to all employees to ensure they understand their roles and responsibilities in protecting information assets.
  • Compliance: Ensure compliance with all relevant laws, regulations, and contractual obligations related to information security.
  • Continuous Improvement: Regularly review and update information security policies, procedures, and practices to address evolving threats and vulnerabilities.


4. Responsibilities

  • Executive Management: Provide leadership and allocate resources to support the implementation and maintenance of the information security program.
  • Information Security Team: Develop, implement, and monitor information security policies, procedures, and controls.
  • Department Managers: Ensure that their teams comply with information security policies and report any security incidents or breaches.
  • Employees: Adhere to information security policies and report any suspicious activities or incidents.


5. Compliance and Enforcement

Non-compliance with this policy may result in disciplinary action, up to and including termination of employment or contract, as well as legal action where applicable. All incidents of non-compliance must be reported to the Information Security Team for investigation and appropriate action.


6. Policy Review

This policy will be reviewed annually or as needed to ensure it remains relevant and effective in addressing information security risks.


TXOne Security Exhibit

Our security best practices are extensive and represent how we continuously ensure that our products and customer data are secure.


TXOne Networks is Certified under ISO/IEC 27001:2022

See the certification here.