WHAT WE DO
GCS is organized around three principles of information security. Our information security tools and techniques follow the implementation of these principles:
WHAT IS CONFIDENTIALITY?
Confidentiality measures are designed to protect against unauthorized disclosure of information. The objective is to ensure that private information remains private and follows the least access principle for employees to complete their business responsibilities.
WHAT IS INTEGRITY?
Integrity protects data from unauthorized modifications. Integrity ensures that trusted data is accurate and has not been inappropriately modified.
WHAT IS AVAILABILITY?
Protecting data and support systems by maintaining available data for a specific amount of time that is necessary to all associated stakeholders.
We support these three principles around the following investigative tools and processes: