The Importance of the OREF Information Security Policies

Understanding our information security policies is fundamental to protecting both organizational and personal assets in today's digital business environment. These policies serve as the foundation for safeguarding sensitive data, maintaining operational continuity, and ensuring regulatory compliance.

When team members comprehend and follow information security policies, they become active participants in the organization's defense against cyber threats. This knowledge helps prevent costly data breaches, which can result in significant financial losses, damaged reputation, and eroded client trust. For instance, a single successful phishing attack due to policy non-compliance can compromise entire networks and expose confidential customer information.

Furthermore, information security policies provide clear guidelines for handling sensitive data, using company resources, and responding to security incidents. This standardization reduces confusion, streamlines operations, and creates a secure working environment. Employees who understand these policies make better decisions about data handling, password management, and suspicious activity reporting.

The security of OREF data is a shared organizational commitment. Together, we’re creating a robust defense against evolving cyber threats while supporting business objectives and growth.


OREF ISP Summary

OREF’s Information Security Policy (ISP) serves as the foundation for protecting ORE Financial Services' information assets and maintaining data privacy. The policy aims to ensure information security through three key principles: restricting unauthorized access, maintaining data integrity, and ensuring availability of information for authorized users.

The policy covers several critical areas:

Access and Authentication

The company requires unique identification and strong authentication for all users. Multi-factor authentication is mandatory for privileged accounts. All system access is based on the principle of least privilege, meaning users only receive the minimum access needed to perform their jobs.

Data Protection

Information must be classified based on sensitivity and protected accordingly. The company employs encryption for sensitive data, both in transit and at rest. Regular backups are required, and proper data disposal procedures must be followed when information is no longer needed.

Incident Response

All security incidents must be reported immediately to the IT Group. The company maintains an incident response team and documented procedures for handling security events. Regular training and testing of incident response procedures is conducted.

Security Awareness

All employees must complete security awareness training upon hiring and annually thereafter. This training covers topics like identifying suspicious activities, proper handling of sensitive information, and security best practices.

Physical Security

Physical access to facilities and equipment is restricted to authorized personnel. Visitor access must be logged and monitored. Environmental controls protect against physical threats to information systems.

Privacy Requirements

The company maintains strict controls over personal data, including requirements for consent, providing privacy notices, and allowing individuals to access and correct their information. All use of personal data must be authorized and limited to specified purposes.

Your Responsibilities

Each employee plays a crucial role in maintaining security by:

  • Following access control procedures

  • Reporting suspected security incidents

  • Protecting sensitive information

  • Completing required security training

  • Complying with all security policies and procedures

The full policy contains detailed requirements for each area. Questions about specific requirements should be directed to your supervisor or the Information Security Officer, Brittany Haavik.

Remember: Information security is everyone's responsibility. Your daily actions help protect our company's information assets and maintain our customers' trust.


Member Login
Welcome, (First Name)!

Forgot? Show
Log In
Enter Member Area
My Profile Log Out