Information security policy creates the roadmap for implementing security measures to protect Gilgamesh Financial Services and/or GFX Securities and/or the Company’s most valuable assets. A strong security policy should set the security tone for the whole Gilgamesh Financial Services and/or GFX Securities and/or the Company, and let personnel know what is expected of them. All personnel should be aware of the sensitivity of data and their responsibilities for protecting it.
This policy is applicable to all personnel with GFX INVESTMENT GROUP LIMITED, including full-time and part-time employees, temporary employees, contractors, and consultants who are “resident” on the entity’s site or otherwise have access to the cardholder data environment.
GFX INVESTMENT GROUP LIMITED must follow the given policy:
Following is the list of insecure services along with their alternative secure services:
Instead of… | Use… |
---|---|
Web Access | HTTP |
File Transfer | FTP, RCP |
Remote Shell | TELNET |
Remote Desktop | VNC |
Data Protection – Confidentiality of Data
The Company adopts measures in line with Data Protection Act in order to implement and maintain systems and procedures that are adequate to safeguard the security, integrity and confidentiality of information. The Company established security mechanisms in order to guarantee the security and authentication of the means of transfer of information, minimize the risk of data corruption and unauthorized access and to prevent information leakage, in order to maintain the confidentiality of the data at all times.
All material non-public information provided by the clients to the Company is held in confidence and is not
made known to any other except as follows:
Overall responsibility for Network Management activity shall be assigned to the Network operations team. Responsibilities for key tasks will be assigned to one or more individuals. It shall be ensured that the use of network services is consistent with the user access management policy and the requirements of the business applications.
The network and security components used for communication and network security shall be appropriately configured, maintained and secured.
The Gilgamesh Financial Services and/or GFX Securities and/or the Company must use intrusion-detection and/or intrusion-prevention techniques to detect and/or prevent intrusions into the network. Monitor all traffic at the perimeter of the cardholder data environment as well as at critical points in the cardholder data environment, and alert personnel to suspected compromises. Keep all intrusion-detection and prevention engines, baselines, and signatures up to date.
Servers supporting critical applications shall be logically separated from other servers. The network design shall have network segregation such that, but not limited to Servers supporting critical applications shall be logically separated from other servers. All connections to the critical application servers shall route through the firewall.
The entry points to the Gilgamesh Financial Services and/or GFX Securities and/or the Company network shall be restricted and ensure that the firewalls are used to secure these entry points.
Network components will be supported by accurate, up-to-date documentation, to ensure that the network is configured accurately and securely.
Current configuration information about network infrastructure and critical network devices like firewall and system components shall be stored locally and backed up securely at an alternate location.
IT shall be responsible to create and maintain network services agreements with external parties. Such agreements shall include but may not be limited to:
Gilgamesh Financial Services and/or GFX Securities and/or the Company maintains its electronic records on cloud service providers and trading system providers. These records consist of the firm’s internal accounting records, subscription agreements, trading records, etc. If our primary site is inoperable, we will continue operations from the back-up site or an alternative location by using new devices and plugging into our online accounts with the cloud service providers.
The Company will maintain certain personally identifiable information regarding clients in its electronic databases to facilitate the processing of transactions on behalf of its clients to comply with rules, regulations, and laws. The personally identifiable information stored on GFX INVESTMENT GROUP LIMITED network is protected from unauthorized access, treated as confidential, and handled according to the terms of the Gilgamesh Financial Services and/or GFX Securities and/or the Company privacy policy.
We attest that personally identifiable information and customer information stored on our systems will be protected as follows:
Gilgamesh Financial Services and/or GFX Securities and/or the Company further attests that should a breach occur, management will promptly take action to secure information, mitigate the breach, and notify, on a timely basis, any customers whose personally identifiable information could have been compromised.
IT Function
The relevant Department will manage IT functions in-house, whereas the Company will enter into collaboration agreements with providers to ensure the Security and Integrity of:
In addition, the Department with necessary external support shall be responsible for ensuring that procedures are in place regarding the following issues:
Continuity of IT Systems
The IT Department has established procedures to ensure that in situations of an interruption to the Company’s systems (trading, telephones, etc.), the following are met:
The Company identifies specific systems that are considered core systems required for ensuring business continuity. These systems ensure: a. The continued and uninterrupted access to the internet. b. The continued and uninterrupted operation of the trading platform. c. The continued and uninterrupted operation of the digital telephone system, which shall be critical to the smooth functioning of the telephone order system. The telephone order placing system shall be an alternative/backup system to the internet-based one.
If, due to system or integration failures, the user of this document is unable to carry out any tasks, then the Company will have to be contacted immediately. If the system issue is not resolved immediately, then the author and/or the approver of this policy should also be informed without undue delay.
To reduce the impact on critical systems caused by underlying failures, the system designs these redundant systems will take into consideration methods and means to support failover to secondary systems.
In order to ensure that systems continue to operate at appropriate levels of performance, system metrics will be collected and monitored by a centralized monitoring solution. Any breach of performance thresholds will be reported to the technical service team for review with upgrades to be planned where appropriate. The Company’s systems, where possible, will be hosted on cloud infrastructure allowing for the rapid increase of resources or removal of over-allocated resources to manage costs.
All major systems within the Company’s computing infrastructure are backed up on a regular basis. Information Technology Services have a Backup Strategy which details the frequency of backups. It is also strongly advised that all users save their work to their network drive; this drive is backed up, and any loss or damage to files can often be rectified by the restoration of the files from an existing backup.
Derivatives (e.g CFDs) are complex instruments and come with a high risk of losing money rapidly due to leverage. You should consider whether you understand how derivatives work and whether you can afford to take the high risk of losing your money.
Restricted Regions: Gilgamesh Financial Services does not provide services for citizens/residents of the United States, Cuba, Myanmar, North Korea. The services of Gilgamesh Financial Services are not intended for distribution to, or use by, any person in any country or jurisdiction where such distribution or use would be contrary to local law or regulation.