Information Security Standard Operating Procedures
Information Security Standard Operating Procedures
Information Security Standard Operating Procedures
STANDARD OPERATING
PROCEDURES
(IS-SOP)
PRECIOUS SHIPPING PUBLIC COMPANY LIMITED INFORMATION SECURITY SOP
GREAT CIRCLE SHIPPING AGENCY LIMITED Established June 2022
© COPYRIGHT
PRECIOUS SHIPPING PUBLIC COMPANY LIMITED 2022
TABLE OF CONTENTS
COVER PAGE
COPYRIGHT
TABLE OF CONTENTS
READER’S ACKNOWLEDGEMENT
All employees shall indicate, by signing below, that they have read and understood the contents of this Manual.
Record of only current employees need to be available.
READER’S ACKNOWLEDGEMENT
All employees shall indicate, by signing below, that they have read and understood the contents of this Manual.
Record of only current employees need to be available.
AMENDMENT RECORD
REVISION 01
ensure that all information, including internal, third party, personal and
electronic data, is treated with complete confidentiality;
maintain integrity of all such information;
ensure that our information system and the information contained meet the needs
of our core and supporting business operations;
comply with all applicable statutory and regulatory requirements;
safeguard security of our information assets through effective business continuity
management;
make information available to staff and the public with minimum disruption;
increase staff awareness of information security management through education
and training;
perform reliable access control to protect our information system against
unauthorized access.
This policy has been approved by the Managing Director and Executive Directors. It
will be reviewed, and if necessary revised, annually to keep up to date and such
revisions will be promptly communicated to all users. We welcome interested parties’
comments on the enforcement of the policy and the policy itself.
THE ORGANISATION
CONTENTS
1.1 INTRODUCTION
1.1.1 Overview
1.1.2 Availability And Distribution Of Company’s Manuals
1.1.3 Information Security Management System Standard
1.1.4 Management’s Responsibility Towards ISMS
1.2 ORGANIZATION
1.2.1 Precious Shipping Public Company Limited (The Company)
1.1 INTRODUCTION
1.1.1 OVERVIEW
Precious Shipping Public Company Limited (PSL) is a pure dry cargo ship-owner operating
in the Handysize, Supramax and Ultramax sectors of the tramp freight market. PSL was
established in December 1989 and commenced commercial operations in March 1991, after
obtaining the approvals from the Bank of Thailand and the Board of Investment. PSL was
granted “listed” status on the Stock Exchange of Thailand on the 16th of September 1993.
Great Circle Shipping Agency Limited (GCSHIP) was established in Bangkok, Thailand in
1988 and, is in the business of Ship Management services, providing full technical and
manning services to our exclusive principals, Precious Shipping PCL, Bangkok, Thailand
who have entrusted all their owned vessels to us. GCSHIP and PSL are located at the same
premises. GCSHIP is a fully owned subsidiary company of PSL. Our objective is to provide
PSL and other customers with safe, reliable, efficient, environmentally friendly and quality
services, which meet the agreed specifications and shall always strive to improve our services.
The Company has established Information Security Management System (ISMS) based on the
ISO’s Information Security Management System (ISO/IEC 27001:2013). The Company’s
ISMS include Standard Operating Procedures, Incident Handling Plan and IT Policy and
Procedures.
The working language, understood by all key personnel is English. Therefore, the Company's
Information Security Management System documentation is in English language. In order to
prevent users from following obsolete or out-of-date systems, procedures, or instructions,
only Controlled Copies of this manual are held with the IT Department and on Company’s
Intranet site which is accessible to all.
It is the wish of the Company that all employees familiarise themselves with the contents of
each manual in the Information Security Management System, thus helping the Company to
achieve its Information Security objectives. Department heads must actively encourage its use
as a source of reference.
Means the international Standard as laid down in ISO/IEC 27001:2013. This standard applies
the high-level structure, identical sub-clause titles, identical text, common terms, and core
definitions with other management system standards to maintain compatibility.
Primary Objectives
Management’s responsibility to the company ISMS is briefly summarised under the following
category of functions:
• To determine the boundaries and applicability of the information security management
policy to align with the strategic direction of the organization.
• Ensuring the integration of information security management system requirements into
the organizations processes
• Ensuring that the resources needed for implementing the information security
management system are made available
IS-SOP published June 2022 Internal Use Only
PRECIOUS SHIPPING PUBLIC COMPANY LIMITED INFORMATION SECURITY SOP
GREAT CIRCLE SHIPPING AGENCY LIMITED Established June 2022
1.1.4.1 IMPLEMENTING
These manuals are also provided in soft copies at the company’s intranet website at
https://preciousshipping.sharepoint.com/sites/pslintranet/
Company information security policy and operating procedures are constantly under
review, necessitating amendments to all manuals from time to time. If several amendments
have been carried out, complete manual will be revised and issued as a new edition when
deemed necessary. Each document holder will be notified of any important changes by
various means of communication such as Email or circulars in the first instance. Amended
sections of the relevant manual are issued subsequently. All amendments carried out in the
manuals will be recorded in the amendment record sheet.
Department shall review these suggestions to carry out amendments and revisions to ISMS
when required. A summary of all reviews received from users are prepared annually and
circulated to employees with comments of the company where necessary.
1.2 ORGANISATION
The Managing Director has entrusted the responsibility of the Company’s functions to the
Executive Directors who are in turn assisted in accomplishing their duties and responsibilities
by the Heads of various departments. The organization consists of highly skilled, experienced,
and motivated professionals, who assist the Managing Director. These personnel are
committed to the Company’s ISMS and ensure Safe Operations consistent with the statutory
rules & regulations, ISO 27001:2013 Standards, best industry practices. The Company’s
Organization chart can be found at the end of this section.
The performance of the policy is the prime responsibility of the Head of IT Department. He
is the Management Representative (MR) for the ISMS. He ensures and verifies that all
Company operations fully conform to the Company's ISMS. MR is responsible to the
Managing Director (MD) and his responsibilities include:
a) Administering and monitoring the Company’s Information Security policies as
documented in the Information Security Management System Policy manual.
b) Ensure that the Company has the necessary expertise, both commercially and
technically, to sustain all its actual or projected activities.
c) Ensuring that the duties and responsibilities identified for all personnel described in
the ISMS are observed.
d) Planning major upgrades
e) Preparation and controlling of budgets.
f) Reporting relating to the performance and running costs to higher management.
g) Authorization of expenditure for purchases of hardware, software, licences Etc.
h) Project and modification studies, preparation of budgets and executing such work on
receiving approval from the management.
i) Dealing with any incidents of non-conformance and security breaches, analysing root
cause, and implementing corrective and preventive actions.
j) Authorization of the appointments of service providers.
k) Take active participation in periodical management review and initiate necessary
actions.
l) Incorporate Risk based thinking into the organisation’s culture.
The prime responsibility of Senior Manager is to assist and depute MR in all matters related
to the company’s information security policy and procedures. SM is a suitably qualified and
experienced subject matter expert, who is well versed in the organization’s processes.
He ensures and verifies that all information services provided to the users fully conform to
the Company's ISMS. SM is responsible to the Management Representative (MR). SM is
assisted by the other members of the IT department. His responsibilities may include but
not limited to following:
a) Administering and monitoring the Company’s Information Security policies as
documented in the Information Security Management System Policy manual.
Planning major upgrades
b) Preparation and controlling of budgets.
c) Project and modification studies, preparation of budgets and executing such work on
receiving approval from the management.
d) Dealing with any incidents of non-conformance and security breaches, analysing root
cause, and implementing corrective and preventive actions.
e) Manage and Maintain IT Infrastructure including Company ERP.
f) Manage and Maintain IT Business Continuity
g) Manage other IT Staff by recruiting, training and communicating job expectations
h) Assess Vendor and procurement.
i) Troubleshoot hardware and software issue related to IT
j) Send Monthly IT Report to MR monthly basis.
k) Project and modification studies, preparation of budgets and executing such work on
receiving approval from the management.
l) Taking active part in the Management reviews and taking actions as deemed
necessary.
m) Ensuring that for any non-Conformities pointed out, proper and timely corrective
action is taken. Preventive measures are put in place to avoid reoccurrence.
n) Ensuring Risk based thinking into the organisation is followed by assigning
responsibilities and authorities for risk and opportunity management activities.
o) Risk Register and Opportunities for Improvements are identified and maintained
within the department under him in the organisation.
AMs comprise of persons familiar with subject matter, qualified, experienced, and well
versed in the organization’s processes.
The AM is responsible to the SM and shall ensure that duties assigned to him, are carried
out in a safe, efficient and timely manner, in compliance with all applicable national and
international rules & regulations and are in conformity with the company’s ISMS policies.
The AM is in-charge of day-to-day functions assigned to him. His duties and responsibilities
are not limited to but include following:
1. Manage and Maintain IT Infrastructure including Company ERP
2. Manage and Maintain IT Business Continuity.
3. Manage and Maintain IT Asset
4. Assess Vendor and Procurement.
5. Troubleshoot hardware and software issue related to IT
6. Monitor and Maintain Backup System for Company.
7. Monitor the system daily
8. Other tasks assigned by MR or SM.
1.3.5 IT Supervisor
The IT Supervisor is in-charge of day-to-day functions assigned to him. His duties and
responsibilities are not limited to but include following:
1. Manage and Maintain IT Infrastructure
2. Manage and Maintain IT Asset
3. Troubleshoot hardware and software issue related to IT.
4. Monitor and Maintain Backup System for Company.
5. Procurement.
6. Monitor the systems daily.
7. Ensuring that all installations, maintenance and upgrade meet to client specifications.
8. Other tasks assigned by MR or SM.
The Quality System Manager has the defined authority and responsibility of:
a. Monitoring the Company’s ISMS.
b. Monitor and maintain records of Non-Conformance’s reported and follow-up of the
Corrective Actions.
c. Analysis of Non-conformities
d. Periodically review the effectiveness of the safety management system
1.4.2 Auditors
Auditors are trained and well experienced in organization’s processes and have defined
responsibility for:
a. Conducting annual internal audits in the company.
b. Co-ordinating and attending external assessments of the company.
c. Assisting QSM to accomplish responsibilities.
The ICM is responsible to the MD. He co-ordinates and advises MD on all matters relating
to Cyber Risk Insurance.
At the end of each month, the SM shall send following report to the MR outlining:
1. Windows Update System Management.
2. Antivirus Management.
3. Backup System Management.
4. Email System Management.
5. Server Management
6. Areas of Concern and recommendations
Effectively anything that the SM thinks will help in implementing the company’s ISMS policy
in a more efficient and cost-effective manner in the future.
The Company’s Information Security Management System has been prepared in accordance
with the requirements of ISO 27001:2013 and the relevant manuals listed below are controlled
by the Company
The Information Security Policy Manual contains the Company policies in compliance with
the standards of ISO 27001:2013 and general good practices. The Information Security
Standard Operating Procedures Manual contains details of the procedures that the Company
operates and maintains, in order to effectively implement the company’s policies.
The Company's Policies cover the following principal areas of information security:
Scope
Terms and Definitions
Context of the Organization
Leadership
Planning
Support
Operations
Performance evaluation
Improvement
For change of role within the organization, HR Department shall follow the process as below.
- Use ITS014 User Access Request Form and get the approval from Head of Department which
employee will be transferring to.
- The IT Staff ensure that the employee will no longer have access to information assets that are
not required in the new role and department and has been given access to information assets
needed for the new role and department.
- Send copy form back to HR Department and keep in binder with record of “ITS004 File Index
Form”
When the employee retires, resigns or is terminated from Company employment, the HR Department
shall do following process.
- Shall document the form ITS014 User Access Request Form and get the approval from Head of
Department.
- The IT department shall ensure that all access rights and privileges for this employee has been
reviewed and revoked at the end of employment date unless an exemption is granted by the
Executive Director.
- Send copy form back to HR Department and keep in binder with record of “ITS004 File Index
Form”
- The IT Administrator shall process system backup as follows: Daily 5 copies, Weekly 2 copies,
Monthly 1 copy and yearly 1 copy into Tape storage.
- The IT Administrator shall backup the data with encryption provided by the Backup Application.
- The IT Administrator shall monitor the backup system and documented it in the form “ITS001
Form Backup Log” daily and periodically reviewed by IT Manager at least once in a month.
- The IT Administrator or IT Manager shall periodic test to restore the data once in a month and
document this in the form “ITS012 Form Spot Check”.
- The IT Administrator must check the audit logs for servers or firewall which are hosted on On-
premises Network and included it in ITS007 Monthly IT Report.
Policy Settings
- All IT Staff who are authorized to reset the user password after verifying with user will ensure
the option “Force user to change password” is selected.
- Any entry to the Data Center by anybody other than the above authorized persons must be
documented using the “ITS017 Form Visitor Log” giving the appropriate reason for the entry.
- IT Technical Support shall monitor the CCTV daily basis and document in ITS011 Form Review
Log Sheet in IT Filled Form\ITS011 Form Review Log Sheet\CCTV
The IT Manager shall be responsible to review the access records and “ITS017 Form Visitor Log
Sheet” quarterly and document “ITS011 Form Review Log Sheet”
- Ensure that mobile computing devices have proper locked screen by method “PIN”,
“Biometrics” or “Password”.
- Ensure user request mobile phone owned by Company through “ITS018 Form Mobile Phone
Requisition”
Accounts /sites/pslacc
HR HR OneDrive
Internal Audit /sites/PSLIA
Technical Management /sites/gcship
RMT /sites/rmtteam
Fleet Personnel /sites/fleet
Procurement /sites/gcship
Training /sites/psltraining
Projects /sites/gcship
SOP CHAPTER21: The Acceptable Use Of Company Equipment, Mobile Devices, Printers,
Copiers, Paper Documents And Bulletin Boards
The Acceptable Use Policy is available at https://preciousshipping.sharepoint.com/sites/pslintranet
Prepare
draft
document
Originator using
approved
No
template
Review
Sign and
Management draft
Yes
Register Distribute
Forward document date the Approved Approved
Representative to MR and approval Document Document
(HOD) approve of new in archive
document
Senior
Management Approved
Yes
?**
Implement
User
** This step may be omitted for departmental documents not affecting entire organization
No
Sign &
Process Review Approved Yes date
DCR ? request
Owner as No
approved
Sign &
Review Date
Head of Forward Change
Yes
request
Department to HOD Request as
approved
Notify users
Quality Amended of
and Register availability
Systems Document
Identify
of updated
Users
Department in archive
document
on database
Implement
User
A copy of all standard forms and checklists to be used for complying with necessary
documentation of ISMS are found in ITS000 Master Registry of Documents
2.3.1 NON-CONFORMITIES
The Head of IT Department shall be responsible for handling all non-conformance reports.
Depending on the severity, he will decide and communicate with the management to
resolve any non-conformance’s reported. In addition he shall carry out an investigation as
detailed in the Incident Handling Plan. In carrying out the investigation, the loss severity
potential and probability of recurrence of the accident/incident shall be clearly specified.
IS-SOP published June 2022 Internal Use Only
PRECIOUS SHIPPING PUBLIC COMPANY LIMITED INFORMATION SECURITY SOP
GREAT CIRCLE SHIPPING AGENCY LIMITED Established June 2022
The report shall indicate an outline of the event, the probable cause and the immediate
corrective action that has been taken to rectify the non-conformance.
Major and Serious non-conformances are subject to full and formal management review,
complete investigation with implementing corrective action procedures, including
identification of root cause, analysis of costs and analysis of the safety aspects of the
incident.
Major non-conformity" means an identifiable deviation that poses a serious threat to the
integrity of an information asset that requires immediate corrective action caused by the
lack of effective and systematic implementation of a requirement of this Code.
1
Appendix A
Investigation and analysis of the root cause and corrective action plan to be implemented as
per guidelines given in the Incident Handling Plan booklet.
2.4 AUDITS
Internal audits will be conducted by the Company appointed Auditors at least once every 12
months. Due dates are assumed from the date of last internal audit. In exceptional
circumstances, this interval may be exceeded by not more than three months.
Observations noted at the time of such audits are conditions which in the opinion of the
auditors, if left unattended may lead to Non-Conformances. They are to be dealt suitably
by the IT Senior Manager.
NCRs raised during such audits are reported by the auditors. the Managing Director of the
company. All documentation shall be separately maintained in the Internal Audit report
file. Unless otherwise mentioned the time period agreed for closing out Internal Audit
NCRs is 60 days.
External assessments or audits are conducted by accredited external party. This is done initially
as a compliance audit for obtaining interim ISO 27001 certificate. Validity of the certificate is
3 years. An intermediate assessment is carried out by the external assessor at 0.5 years
before the expiry date of the certificate. Non - conformances raised by the assessor during
these audits shall be dealt with in a similar manner as other NCRs. The Head of IT shall
forward the corrective action plan (CAP) to the assessor within 4 weeks after receiving the
NCR. External assessors may verify the results by a follow up audit if necessary.