This article is also available in:
Read more about our Information Security Policy here.

Easy LMS B.V. (Easy LMS) is located in the Netherlands and provides a SaaS (software as a service) learning management system. The board of directors and management of Easy LMS are committed to preserving the confidentiality, integrity, and availability of all the physical and information assets throughout Easy LMS. This is in order to preserve its competitive edge, commercial image, cash-flow, profitability, and legal/regulatory/contractual compliance. Information and information security requirements will continue to align with Easy LMS' goals. We have implemented an ISMS (Information Security Management System) intended to be a mechanism for information sharing, electronic operations, e-commerce, and identifying and reducing information-related risks to acceptable levels.

In particular, business continuity and contingency plans, data backup procedures, avoidance of viruses and hackers, access control to systems, and information security incident reporting are fundamental to this policy. These are described in policies and supporting documents in the ISMS.

The ISMS, of which this policy and other supporting and related documentation is part, has been designed in accordance with the specification contained in ISO 27001. The ISMS is subject to continuous, systematic review and improvement. We have appointed a Security Officer, who is responsible for the management and maintenance of the ISMS and risk treatment plan. Easy LMS is committed to achieving certification of its ISMS to ISO 27001.

All employees of Easy LMS and its IT service provider are expected to comply with this policy and with the ISMS that implements it. All employees will receive appropriate training. The consequences of breaching policies in the ISMS are set out in Easy LMS' disciplinary policy and in contracts and agreements with third parties.

In this policy, ‘information security’ is defined as: Preserving the confidentiality, integrity, and availability of all the physical assets and of all information assets, throughout Easy LMS.

This means that management, all full-time and part-time employees, and our IT service provider will be made aware of their responsibilities (which are defined in their job descriptions or contracts) to preserve information security, to report security breaches, and to act in accordance with the requirements described in the ISMS. All employees will receive information security awareness training, and more specialized staff will receive appropriately specialized information security training.

This involves ensuring that information is only accessible to those authorized to access it and therefore preventing both deliberate and accidental unauthorized access to Easy LMS' information, proprietary knowledge, and systems.

This involves safeguarding the accuracy and completeness of information and processing methods, and therefore requires preventing deliberate or accidental, partial or complete, destruction or unauthorized modification of either physical assets or electronic data. There must be appropriate contingency and data backup plans and security incident reporting. Easy LMS must comply with all relevant data-related legislation of the jurisdictions it operates in.

This means that information and associated assets should be accessible to authorized users when required and therefore physically secure. The computer network must be resilient, and Easy LMS must detect and respond rapidly to incidents that threaten the continued availability of assets, systems, and information. There must be appropriate business continuity plans.

All the physical assets
The physical assets of Easy LMS include, but are not limited to, computer hardware, data cabling, telephone systems, filing systems, and physical data files.

All information assets
The information assets include information printed or written on paper, transmitted by post or shown in films, or spoken in conversation, as well as information stored electronically on servers, website(s), extranet(s), intranet(s), PCs, laptops, and mobile phones, as well as on USB sticks, backup tapes and any other digital or magnetic media, and information transmitted electronically by any means. This includes the sets of instructions that tell the system(s) how to manipulate information (i.e., the software: operating systems, applications, utilities, etc.).

Throughout Easy LMS
Easy LMS and its IT service provider, who are part of Easy LMS' integrated network, have signed up to our security policy and have accepted our ISMS.

Document Owner and Approval
The Security Officer is the owner of this document and is responsible for ensuring that this policy document is regularly reviewed. This policy will be reviewed in response to any risk assessment or risk treatment plan changes, and at least annually.

A current version of this document is available to all staff members in Confluence. It does not contain confidential information and can be released to relevant external parties.

This information security policy was approved by the CEO of Easy LMS on 5 May 2022.
Was this article helpful?
Thank you!