Our dedication is to empower your financial aspirations through a diverse range of customized financial solutions.
The purpose of this Information Technology (IT) Policy is to establish guidelines and procedures for the management, security, and compliance of IT systems, data, and infrastructure within PJ Credit Capital Private Limited. This policy is developed in accordance with the guidelines provided by the Reserve Bank of India (RBI) and is designed to safeguard the confidentiality, integrity, and availability of IT resources while ensuring compliance with regulatory requirements.
This IT Policy applies to all employees, contractors, and third-party vendors who access, use, or maintain PJ Credit Capital Private Limited IT resources, including but not limited to computers, networks, data, applications, and related infrastructure.
The Board on behalf of the Company lays down the criteria for Information Technology Policy. The guidelines in respect of Information Technology Policy in the Company broadly includes the following:
The Board of the Company shall keep in mind the access to individual and control thereupon.
User Account Management
Password Management
The Company shall have integrated system in place to safeguard the data.
Data Classification
Data Encryption
Data Backup
Security Incidents
Each user roles are essential to ensure that individuals within the organization have appropriate access, responsibilities, and privileges based on their job functions. Each user role shall be well-defined to maintain security, compliance, and efficiency.
The company shall prevent reliance on a single or a small number of individuals to perform specific tasks. It is essential to establish a clear delegation of authority for the ability to modify user profiles, permissions, and key business parameters, such as interest rates, which shall be properly documented.
The Maker-Checker concept is employed to mitigate the risk of errors and misuse, enhancing the reliability of data and information. This approach involves one person (the “Maker”) creating or modifying a record, while another person (the “Checker”) reviews and verifies the accuracy and integrity of the work before it is finalized or implemented.
Information security, is a broader concept that encompasses the protection of all forms of sensitive data and information within an organization. It includes not only digital data but also physical documents, intellectual property, and information in transit. The primary goal of information security is to safeguard the confidentiality, integrity, and availability of data. Key components of information security include:
Cyber security is a subset of information security that specifically focuses on safeguarding an organization’s digital assets and systems from cyber threats and attacks. It deals with the protection of networks, computer systems, and the data they contain. Cyber security measures are essential to defend against a wide range of threats, including malware, ransomware, phishing, hacking, and more. Key components of cyber security include:
Mobile Financial Services and Information Security:
Companies already using or planning to implement Mobile Financial Services shall establish a framework for safeguarding the information assets utilized by mobile applications to serve customers. The technology employed for mobile services shall guarantee confidentiality, integrity, authenticity, and incorporate end-to-end encryption to ensure the security of transactions and customer data.
Social Media Risks:
Companies leveraging Social Media for marketing purposes need to be well-prepared to address the risks and threats associated with this platform. Given that Social Media is susceptible to issues like account takeovers and the distribution of malware, organizations shall implement robust controls, such as encryption and secure connections, to effectively mitigate these risks.
Digital Signatures:
A Digital Signature Certificate serves to electronically authenticate an entity’s identity, enhancing the security of online transactions and preserving the privacy of information exchanged. Companies may consider the adoption of digital signatures to safeguard the authenticity and integrity of crucial electronic documents, as well as to ensure the security of high-value fund transfers.
The company’s IT function is responsible for supporting a robust and comprehensive Management Information System (MIS) tailored to the specific needs of the business. An effective MIS shall cater to information requirements at all organizational levels, including top management.
The company shall implement an MIS that aids top management and business heads in decision-making and provides oversight over the operations of different business units. With a well-established IT infrastructure, the company shall include the following components in its system-generated MIS:
In essence, the company’s IT function plays pivotal role in establishing a versatile MIS that empowers decision-makers at all levels and ensures efficient oversight and compliance across various business functions.
The Company shall be accountable for determining the necessary actions in response to reported observations and recommendations during compliance assessments. In order to establish an effective framework for compliance, it is essential to define the following:
It is imperative that the policy be formally approved by the Board of Directors. It shall also undergo a regular review, either annually or in response to significant changes in the existing IT environment that could impact policy and procedures. This review shall be carried out by the Chief Information Security Officer (CISO), and the updated policy shall be presented to the Board for reapproval.
Furthermore, the company shall conduct an extensive risk assessment of its IT systems at least annually. This assessment shall involve an analysis of potential threats and vulnerabilities to the company’s IT assets, as well as an evaluation of existing security controls and processes. The primary objective of this exercise is to identify and understand the risks inherent in the IT environment and to determine the requisite level of controls for effective risk mitigation.
By following this process, the company can ensure that its IT systems are subject to regular and rigorous risk assessments, that controls are adjusted as necessary, and that the Board maintains oversight of this critical aspect of information security.
Regular backups of all data shall be created and periodically tested to ensure the preservation and integrity of the data. All records shall be stored on day to day basis in the company’s centralized electronic record software database.