{"id":12437,"date":"2023-03-10T19:07:12","date_gmt":"2023-03-10T19:07:12","guid":{"rendered":"http:\/\/www.hns-re2sd.dz\/?page_id=12437"},"modified":"2023-03-10T19:19:36","modified_gmt":"2023-03-10T19:19:36","slug":"information-security-charter","status":"publish","type":"page","link":"http:\/\/www.hns-re2sd.dz\/en-fr\/information-security-charter\/","title":{"rendered":"Information Security Charter"},"content":{"rendered":"<div data-colibri-id=\"12437-c1\" class=\"style-4648 style-local-12437-c1 position-relative\">\n  <!---->\n  <div data-colibri-component=\"section\" data-colibri-id=\"12437-c2\" id=\"custom\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-4649 style-local-12437-c2 position-relative\">\n    <!---->\n    <!---->\n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      <!---->\n      <div data-colibri-id=\"12437-c3\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-4650 style-local-12437-c3 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-4651-outer style-local-12437-c4-outer\">\n            <div data-colibri-id=\"12437-c4\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-4651 style-local-12437-c4 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"12437-c5\" class=\"h-text h-text-component style-4652 style-local-12437-c5 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p>The Higher National School of Renewable Energies, Environment &amp; Sustainable Development provides users with IT tools to accomplish their assigned tasks. However, improper use of these tools poses a security risk to the organization&#8217;s\n                      information system. To ensure a suitable level of security, an information security charter was established as part of the national information security program.<\/p>\n                    <p>The purpose of this charter is to provide guidelines for using the organization&#8217;s IT tools safely and securely. It sets out the rules and procedures to be followed when using these tools and outlines the consequences of violating them.\n                      The charter emphasizes the importance of protecting the organization&#8217;s information assets from unauthorized access, use, disclosure, modification, or destruction.<\/p>\n                    <p>Users must adhere to the information security charter to maintain the confidentiality, integrity, and availability of the organization&#8217;s information assets. They must report any security incidents or vulnerabilities to the appropriate\n                      authorities promptly. Failure to comply with the charter will result in disciplinary action. <\/p>\n                    <p>Therefore, it is the responsibility of every user to read, understand, and follow the guidelines set out in the information security charter. This will ensure the organization&#8217;s continued success in achieving its mission while protecting\n                      its information assets from security threats.<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"12437-c8\" class=\"style-4655 style-local-12437-c8 position-relative h-element\">\n                  <!---->\n                <\/div>\n                <div data-colibri-id=\"12437-c6\" class=\"h-x-container style-4653 style-local-12437-c6 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-x-container-inner style-dynamic-12437-c6-group style-4653-spacing style-local-12437-c6-spacing\"><span class=\"h-button__outer style-4654-outer style-local-12437-c7-outer d-inline-flex h-element\"><a h-use-smooth-scroll=\"true\" href=\"https:\/\/drive.google.com\/file\/d\/1k0XlKJgUTQI76DiSm5xSARIF88Thrtdv\/view?usp=share_link\"  data-colibri-id=\"12437-c7\" class=\"d-flex w-100 align-items-center h-button justify-content-lg-center justify-content-md-center justify-content-center style-4654 style-local-12437-c7 position-relative\"><!----><span  class=\"h-svg-icon h-button__icon style-4654-icon style-local-12437-c7-icon\"><!--Icon by Font Awesome (https:\/\/fontawesome.com)--><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"download\" viewBox=\"0 0 1664 1896.0833\"><path d=\"M1280 1344q0-26-19-45t-45-19-45 19-19 45 19 45 45 19 45-19 19-45zm256 0q0-26-19-45t-45-19-45 19-19 45 19 45 45 19 45-19 19-45zm128-224v320q0 40-28 68t-68 28H96q-40 0-68-28t-28-68v-320q0-40 28-68t68-28h465l135 136q58 56 136 56t136-56l136-136h464q40 0 68 28t28 68zm-325-569q17 41-14 70l-448 448q-18 19-45 19t-45-19L339 621q-31-29-14-70 17-39 59-39h256V64q0-26 19-45t45-19h256q26 0 45 19t19 45v448h256q42 0 59 39z\"><\/path><\/svg><\/span>                    <span>download INFORMATION SECURITY CHARTER<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The Higher National School of Renewable Energies, Environment &amp; Sustainable Development provides users with IT tools to accomplish their assigned tasks. However, improper use of these tools poses a security risk to the organization&#8217;s information system. To ensure a suitable level of security, an information security charter was established as part of the national information [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width-page.php","meta":[],"_links":{"self":[{"href":"http:\/\/www.hns-re2sd.dz\/en-fr\/wp-json\/wp\/v2\/pages\/12437"}],"collection":[{"href":"http:\/\/www.hns-re2sd.dz\/en-fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.hns-re2sd.dz\/en-fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.hns-re2sd.dz\/en-fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.hns-re2sd.dz\/en-fr\/wp-json\/wp\/v2\/comments?post=12437"}],"version-history":[{"count":2,"href":"http:\/\/www.hns-re2sd.dz\/en-fr\/wp-json\/wp\/v2\/pages\/12437\/revisions"}],"predecessor-version":[{"id":12443,"href":"http:\/\/www.hns-re2sd.dz\/en-fr\/wp-json\/wp\/v2\/pages\/12437\/revisions\/12443"}],"wp:attachment":[{"href":"http:\/\/www.hns-re2sd.dz\/en-fr\/wp-json\/wp\/v2\/media?parent=12437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}