Last updated: [22nd of May, 2025]
Introduction

Information is a strategically important asset for UAB Agmis. Its loss, unauthorized alteration, damage, disclosure, or disruption of processing can cause operational disruptions for the company.

The company’s management ensures information security by clearly leading this process, assuming responsibilities, and distributing accountability for information protection.

Information Security Policy

It is the strategic decision of UAB Agmis management to ensure information security, taking into account the overall operational and risk context.

Key Aspects of Information Security:
  • Confidentiality – protection of information from unauthorized disclosure.
  •  Integrity – protection of information from unauthorized or accidental modification.
  • Availability – ensuring that information is accessible when needed to properly conduct the operations of UAB Agmis.
Information Security Objectives
  • To ensure appropriate and effective management of information security.
  • To prevent operational disruptions and harm resulting from breaches of confidentiality, integrity, or availability.
UAB Agmis Commitments
  • Ensure effective risk management and the use of appropriate risk mitigation measures to maintain risk at an acceptable level.
  • Protect the organization’s information assets from intentional or accidental disclosure, distribution, theft, damage, destruction, falsification, or distortion.
  • Ensure that information security incident management is consistent and effective.
  • Ensure the adequacy of the Business Continuity Management Plan by reviewing and testing it periodically.
  • Ensure compliance with legal requirements and obligations to third parties.
  • Implement information security objectives and allocate the necessary resources to achieve them.
  • Promote and strengthen employee values such as responsibility for information confidentiality, integrity and availability, collaboration, continuous improvement, focus on results, and adherence to applicable requirements.
  • Implement organizational and technical information security measures that reflect best practices.
  • Maintain and continually improve the implemented information security management system in accordance with the requirements of the LST EN ISO/IEC 27001 standard.
Final provisions
  • This policy is approved and amended by decision of the Company’s Director.
  • Responsibility for monitoring the implementation of this policy lies with the Information Security Officer.
  • The policy is reviewed at least once a year and updated as necessary.
  • All new and current employees are informed about the policy.
  • The policy is published on the Company’s public website.