ContractHero Logo
LoginBook a demo
Product
Contract managementContract analysisRemindersField construction kitMulti-client capabilityUser rolesImport & ExportAddress bookDigital signatureContract creationContract creationIntegrations
Solutions
Finance departmentsLegal departmentsProcurementOperations teams
PricingSecurity
Resources
Success storiesBlogWebinarsWhitepapersTemplates
LoginBook a demo

Security Policy

Last Update: February 2024

1. general information security policy

1.1 Commitment to information security

  • Confidentiality, Integrity, and Availability: the organization is dedicated to safeguarding the confidentiality, integrity, and availability of information processed and stored within its systems, whether owned by the organization, our employees, partners, customers, or suppliers.
  • Information Security Management System (ISMS): The organization has implemented an Information Security Management System (ISMS) compliant with ISO 27001 standards, demonstrating our commitment to robust information security practices.

1.2 Leadership and commitment

  • Strategic Alignment: The organization's management ensures that the information security policy and objectives are in harmony with the strategic direction of the organization.
  • Integration into Processes: The integration of ISMS requirements into organizational processes is actively managed to strengthen information security.
  • Roles and Responsibilities: Specific roles and responsibilities are assigned to ensure effective oversight and execution of the ISMS.
  • Resource Availability: Resources needed for the ISMS are prioritized and made readily available to support its ongoing effectiveness.
  • Continual Improvement: The organization's leadership promotes a culture of continual improvement for the ISMS, fostering adaptability to emerging challenges and technological advancements.

1.3 Key Objectives of the ISMS

  • Compliance Assurance: The organization is committed to ensuring compliance with relevant information security regulations and meeting the expectations of interested parties.
  • Cyber Resilience and Continuity: Maintaining cyber resilience and ensuring process continuity are key objectives, reflecting our dedication to uninterrupted business operations.
  • Risk Management: The organization identifies information security risks and implements measures to reduce them to an acceptable level.

1.4 Fundamental Principles

  • Integral to Every Activity: Information security is integral to every procedure, process, or activity within the organization, reflecting our holistic approach to protecting information assets.
  • Employee Involvement: All the organization's employees actively treat information security as an essential part of their day-to-day work, contributing to a collective responsibility for information protection.
  • Continuous Improvement Commitment: The organization is dedicated to the continual improvement of the suitability, adequacy, and effectiveness of the ISMS, adapting to evolving security landscapes.

1.5 Policy Assessment and Revision

  • Periodic Evaluation: The Information Security Policy undergoes regular assessment, revision, and updating every two years or more frequently, if necessary, to ensure its relevance in response to changing conditions.
Product
Contract management
Digital signature
Contract Drafting
Integrations
Pricing
Company
About us
ROI calculator
Career
Press
LinkedIn
YouTube
Support
Whitepaper
Webinars
Help article
Status
Trust Center
Legal
Privacy
Security Policy
GTC
Imprint
Language
Deutsch
English
You can reach us at: (+49) 30-57712332
©2025 ContractHero | Developed and hosted in DE