29 Code of Business conduct and Ethics training We invest in comprehensive training programs to educate our employees and stakeholders about the nuances of anti-corruption, bribery, and ensure adherence to our Code of Conduct. All employees are assigned courses on Code of Business conduct and Ethics, anti-corruption, bribery, anti-money laundering in our digital learning management system (LMS) and 100% training of these courses are ensured for both new and regular employees including governance body members in the reporting year. Reporting breaches We consistently report on the total number of incidents or violations in various areas, including but not limited to corruption, bribery, harassment, confidentiality breaches, conflicts of interest, money laundering. Information Security We recognize the paramount importance of information security in an era where digital assets play a central role in our operations. Our commitment to protecting sensitive information is epitomized by our Information Security Management System (ISMS) and our achievement of ISO 27001:2013 certification for all our operational sites. It provides a clear direction and support to ensure protection of our information assets, and to allow access, use, and disclosure of information in accordance with appropriate standards and laws. Our ISMS is built upon a foundation of rigorous risk assessment and management. We systematically identify potential risks to information security, cyber security and physical security, evaluate their impact, and implement robust control to mitigate these risks effectively. The framework of our ISMS is anchored in a comprehensive set of policies and procedures which ensures that any security incidents, whether internal or external, are promptly detected, reported, and addressed with precision to minimize potential impact. Our ISMS includes stringent access controls to ensure that information is accessible only to authorized personnel. The goal is to ensure, beyond the IT department, an appropriate level of protection for the confidentiality, availability, and integrity of information within the entire organization or the defined scope. It encompasses areas of security strategy & risk management, technical security, cyber defense & orchestration. Potential threats relating to information security are identified, analyzed, and mitigated, making them controllable. Incidents reported Number of confirmed corruption incidents Nil Number of reports related to whistleblower procedure Nil Number of incidents of discrimination and harassment Nil Number of information security breaches Nil
RkJQdWJsaXNoZXIy MTIwMDc4NQ==