COOKIES
We use cookies (functional, statistics and advertising cookies) to make your site experience even better and to ensure the effective operation of our site. Use of absolutely necessary cookies (functional) is automatic under our
Cookies Policy
. Click "Accept" to activate only the absolutely necessary cookies or "Accept all" to activate all cookies on our website. If you want to learn more about how to use cookies or to adjust other cookie settings to your preference, you can select the "Cookies settings" field.
×
Cookies Settings
ACCEPT
ACCEPT ALL
COOKIES SETTINGS
ESSENTIAL
The essential cookies are absolutely necessary for the proper functioning of the site. They allow you to browse and use its features. They are automatically installed when you visit the website.
Always On •
STATISTICS (GOOGLE ANALYTICS)
Statistics cookies help us, as website owners understand how visitors interact with site pages by collecting information in Google Analytics.
Suggested •
MARKETING
These cookies are used to track site users' preferences. Their use relates to the promotion of relevant advertisement.
ACCEPT SELECTED
+30 210 6968000
85, Mesogeion ave., Athens 115 26, Greece
G.E.MI. Number:
000253001000
Share Price:
+30 210 6968000
ΕΝ
GR
The Group
The Group
MORE
History
Corporate Purpose
Management
Corporate Governance
Committees
Quality Management
Certifications
Code of Conduct
Certifications
Health, Safety & Environmental Policy
Certifications
Personal Data Policy
Processing of Personal Data through CCTV
Human Rights Policy
GEK TERNA Group Purchasing Policy
Information Security Policy
Business Continuity Policy
Activities
Activities
MORE
Infrastructure
Concessions
Motorways
Airports
Tourism and entertainment development projects
Ports
Integrated waste management infrastructure projects
Digital Economy projects
Parking stations
Clean Energy
Thermal Energy
Real Estate
Other Activities
Human Resources
Human Resources
MORE
Employment Conditions
Career Opportunities
Available Job Positions
Submit your CV
Investor Relations
Investor Relations
MORE
GEK TERNA Group
At a glance
Financial Information Summary
Frequently Asked Questions
Risks Involved with Investing
Financial Information
Financial Statements
Subsidiaries' Financial Statements
Share Capital
IR Releases
Corporate presentation
Corporate Videos
Shareholders Information
Shareholders' meetings
Dividends
Insiders
Transactions' Disclosure - Regulated Information
Corporate Governance
Board Of Directors
Internal Audit
Risk Management
Commitees
Financial Calendar
The Share
Share Info
Share Price
Shareholders' Structure
Corporate Bonds
Bond Holders Meeting CBL 2018
Bond Holders Meeting CBL 2020
Bond Holders Meeting CBL 2021
Corporate Announcements
Press Releases
IR Contact Details
Media Center
Media Center
MORE
Press Releases
Announcements
Key Financial Figures
IRC ELLINIKOU
NORTHERN ROAD AXIS OF CRETE (V.Ο.Α.Κ.)
Our stories
Presentations
Event Calendar
Logos
Photo Gallery
Video Gallery
Sustainability
Sustainability
MORE
Sustainable Development Strategy
Strengthening our social footprint
Socio-economic impact
Stakeholder engangement
SDG's contribution
Environment
Promoting Human Values
Sustainable Development Report 2023
Sustainability Reports
INFORMATION SECURITY POLICY
Home
>
The Group
>
Information Security Policy
History
Corporate Purpose
Management
Corporate Governance
Quality Management
Code of Conduct
Health, Safety & Environmental Policy
Personal Data Policy
Human Rights Policy
GEK TERNA Group Purchasing Policy
Information Security Policy
Business Continuity Policy
INFORMATION SECURITY POLICY
The fundamental principles and basic conditions to protect Data and Systems from threats and breaches, to create a digitally secure work, investment and development environment, are reflected in the
Information Security Policy
of the
GEK TERNA Group
.
Information Security
is an absolute priority and an explicit commitment for
GEK TERNA Group
.
We have adopted a security framework which includes a long list of technical, administrative and organizational protection measures. In compliance with the European Data Protection Regulation (GDPR) monitoring newer regulatory frameworks such as NIS2 and AI Act and based on International Standards such as ISO 27001 and ISO 22301, as well as internationally recognized best practices and advanced technologies, we implement Policies and Procedures that ensure the integrity, confidentiality and availability of our data.
The security measures cover both the protection perimeter within the Group and its environment. They include - among others - organization with specialized staff with many years of experience, access management to data and systems, staff training and awareness, as well as assessment of the level of security of our partners and suppliers to manage threats, while in addition there are institutionalized speaking bodies for instant digital transformation and IT security decisions.
At the same time, we implement continuous preventive monitoring of information systems and infrastructures and prepare regular resistance tests with the aim of immediately identifying and managing any incident before it turns into a threat. Through the most modern and valid tools and technologies, which are constantly upgraded, we ensure that any attempted breach or malicious activity is detected and dealt with in a timely manner.
The "management commitment" that we apply in practice is one of the main factors to ensure the desired result, thus actively supporting the existing security framework, as well as any action to upgrade it, so that we continue to be at the forefront of a continuous digital transformation.
The
Information Security Policy
is accompanied by the following policies, which shape the data and systems security framework:
Remote Access
Classification of Information
Acceptable use of IT resources
Password management
Integration of New IT Applications
Access to third parties outside the Group
Security logic management
Change management
Security exceptions
Update management
Event recording of equipment, applications & networks
Backups
Proper use of the workplace
Security incident management
Information security audit & testing