{"id":966,"date":"2022-04-19T20:23:13","date_gmt":"2022-04-19T20:23:13","guid":{"rendered":"https:\/\/www.upgreat.pl\/?page_id=966"},"modified":"2023-07-27T11:07:41","modified_gmt":"2023-07-27T11:07:41","slug":"polityki-bezpieczenstwa","status":"publish","type":"page","link":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/","title":{"rendered":"Security policies"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"966\" class=\"elementor elementor-966\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d2576a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d2576a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cf75c6\" data-id=\"3cf75c6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43c912b elementor-widget elementor-widget-heading\" data-id=\"43c912b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Security policies<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d035f6a elementor-widget elementor-widget-breadcrumbs\" data-id=\"d035f6a\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.upgreat.pl\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f6bb74d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f6bb74d\" data-element_type=\"section\" id=\"tabs-nav\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b1a5cdf\" data-id=\"b1a5cdf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d085ff9 elementor-widget elementor-widget-heading\" data-id=\"d085ff9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\">Security of IT systems<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc45979 elementor-nav-menu--dropdown-none menu-oferta elementor-widget elementor-widget-nav-menu\" data-id=\"bc45979\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;vertical&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;i class=\\&quot;fas fa-caret-down\\&quot; aria-hidden=\\&quot;true\\&quot;&gt;&lt;\\\/i&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<nav aria-label=\"Menu\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-vertical e--pointer-background e--animation-fade\">\n\t\t\t\t<ul id=\"menu-1-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\" tabindex=\"-1\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\" tabindex=\"-1\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\" tabindex=\"-1\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\" tabindex=\"-1\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\" tabindex=\"-1\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\" tabindex=\"-1\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1abc68b\" data-id=\"1abc68b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cc11fd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc11fd7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d79a1f1\" data-id=\"d79a1f1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a8048f6 elementor-widget elementor-widget-text-editor\" data-id=\"a8048f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>What is the security policy in the company?<\/h2><p><strong>Security policy<\/strong>\u00a0is a study containing a set of rules to protect the system<br \/>company information (IT, communication, access control and other systems)<br \/>in business processes). The main purpose of implementing the security policy is:<\/p><ul><li>Protection against data loss or loss of their integrity and confidentiality<\/li><li>Ensuring the continuity of business processes<\/li><li>Avoidance of measurable financial losses<\/li><\/ul><p>\u00a0<\/p><h2><strong>The benefits of having a security policy<\/strong><\/h2><ul><li>Development and implementation of regulations and procedures adapted to the environment of a specific company<\/li><li>Developing habits of maintaining information confidentiality and limited trust<\/li><li>Applying the above habits not only to strangers, but also to people whose identity we are not able to confirm<\/li><li>Building awareness among employees that their actions are subject to strict procedures, deviation from which may result in specific threats<\/li><li>The transfer of the above principles into the sphere of private life will also increase its security<\/li><\/ul><p>\u00a0<\/p><h2><strong>What is included in the security policy?<\/strong><\/h2><ul><li>Classification of individual components of an IT system in terms of their necessity in running business processes<\/li><li>Definition of security levels for individual classes of necessity<\/li><li>Definition of the properties to be protected<\/li><li>Definition of procedures and recommendations for employees of particular departments<\/li><li>Specimens of the documents used<\/li><li>Work regulations in the IT system<\/li><\/ul><p>\u00a0<\/p><h2><strong>An exemplary necessity classification<\/strong>:<\/h2><ul><li>Necessary - elements without which the company&#039;s operation is impossible<\/li><li>Important - elements whose tasks can be performed by other means, but with additional effort and cost<\/li><li>Essential - elements whose tasks must be divided due to the amount of information<\/li><li>Supportive - elements whose tasks can be performed with the use of other tools with little additional effort and resources<\/li><\/ul><p>\u00a0<\/p><h2><strong>Examples of policy-defined security levels<\/strong>:<\/h2><ul><li>Critical level - covers data and equipment, the damage of which may cause a breakdown in the functioning of the company<\/li><li>High level - covers data and equipment, the damage of which may cause significant difficulties in the normal functioning of the company<\/li><li>Average level - covers data and equipment, the loss of which will slightly affect the functioning of the company<\/li><li>Low level - protects data and equipment, the loss of which may cause only minor damage, without affecting the functioning of the company<\/li><\/ul><p>\u00a0<\/p><h2><strong>Recommendations and procedures included in the security policy<\/strong><\/h2><ul><li>Concerning the administration of ICT systems<\/li><li>Concerning the use of ICT systems (e.g. installing software, defining passwords, reading external media and destroying data carriers)<\/li><li>Concerning the recruitment and dismissal processes of employees and the storage of their data (department<br \/>frame)<\/li><\/ul><p>\u00a0<\/p><h2><strong>Specimens of documents included in the security policy<\/strong><\/h2><ul><li>Confidentiality statement for employees using remote<br \/>access to company resources (vpn)<\/li><li>Confidentiality statement for people from outside the company using the temporary<br \/>remote or local access to perform the contracted work<\/li><li>Company secrecy declaration<\/li><li>work regulations in the IT system<\/li><\/ul><p>\u00a0<\/p><h2><strong>Company secret<\/strong><\/h2><ul><li>One of the tasks of the security policy should be the protection of company secrets<\/li><li>A trade secret consists of undisclosed technical, technological or organizational information and information of economic value, for which<br \/>the employer has taken the necessary steps to maintain their confidentiality. It is therefore information unknown to the general public or persons who, due to their profession or activity, are interested in having it.<\/li><li>Legal basis: the Labor Code (Journal of Laws of 1998, No. 21, item 94, as amended), the Act on Combating Unfair Competition (Journal of Laws of 2003, No. 153, item 1503, as amended). d.)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Security Policies IT Systems Security What is the company&#039;s security policy? Security policy is a study containing a set of rules aimed at protecting the company&#039;s information system (IT systems, communication systems, access control systems and other systems involved in business processes). The main goal of implementing the security policy is: Protection against data loss or loss of their integrity and confidentiality Ensuring the continuity of business processes Avoiding [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"parent":456,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-966","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Polityka bezpiecze\u0144stwa IT w firmie, procedura bezpiecze\u0144stwa informacji | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Polityka bezpiecze\u0144stwa IT w firmie, procedura bezpiecze\u0144stwa informacji | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\" \/>\n<meta property=\"og:description\" content=\"Polityki bezpiecze\u0144stwa Bezpiecze\u0144stwo System\u00f3w IT Czym jest polityka bezpiecze\u0144stwa w firmie? Polityka bezpiecze\u0144stwa\u00a0to opracowanie zawieraj\u0105ce zbi\u00f3r zasad maj\u0105cych na celu ochron\u0119 systemuinformacyjnego firmy (systemy informatyczne, komunikacyjne, kontroli dost\u0119pu i inne bior\u0105ce udzia\u0142w procesach biznesowych). G\u0142\u00f3wnym celem wdra\u017cania polityki bezpiecze\u0144stwa jest: Ochrona przed utrat\u0105 danych lub utrat\u0105 ich integralno\u015bci i poufno\u015bci Zapewnienie ci\u0105g\u0142o\u015bci proces\u00f3w biznesowych Unikni\u0119cie [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-27T11:07:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\",\"url\":\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\",\"name\":\"Polityka bezpiecze\u0144stwa IT w firmie, procedura bezpiecze\u0144stwa informacji | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"datePublished\":\"2022-04-19T20:23:13+00:00\",\"dateModified\":\"2023-07-27T11:07:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bezpiecze\u0144stwo System\u00f3w IT\",\"item\":\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Polityki bezpiecze\u0144stwa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Company IT security policy, information security procedure | UpGreat.pl \u2013 professional IT services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/","og_locale":"en_US","og_type":"article","og_title":"Polityka bezpiecze\u0144stwa IT w firmie, procedura bezpiecze\u0144stwa informacji | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne","og_description":"Polityki bezpiecze\u0144stwa Bezpiecze\u0144stwo System\u00f3w IT Czym jest polityka bezpiecze\u0144stwa w firmie? Polityka bezpiecze\u0144stwa\u00a0to opracowanie zawieraj\u0105ce zbi\u00f3r zasad maj\u0105cych na celu ochron\u0119 systemuinformacyjnego firmy (systemy informatyczne, komunikacyjne, kontroli dost\u0119pu i inne bior\u0105ce udzia\u0142w procesach biznesowych). G\u0142\u00f3wnym celem wdra\u017cania polityki bezpiecze\u0144stwa jest: Ochrona przed utrat\u0105 danych lub utrat\u0105 ich integralno\u015bci i poufno\u015bci Zapewnienie ci\u0105g\u0142o\u015bci proces\u00f3w biznesowych Unikni\u0119cie [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/","og_site_name":"Upgreat","article_modified_time":"2023-07-27T11:07:41+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/","url":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/","name":"Company IT security policy, information security procedure | UpGreat.pl \u2013 professional IT services","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"datePublished":"2022-04-19T20:23:13+00:00","dateModified":"2023-07-27T11:07:41+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Bezpiecze\u0144stwo System\u00f3w IT","item":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/"},{"@type":"ListItem","position":3,"name":"Polityki bezpiecze\u0144stwa"}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=966"}],"version-history":[{"count":11,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/966\/revisions"}],"predecessor-version":[{"id":1921,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/966\/revisions\/1921"}],"up":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/456"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}