(a) All employees, volunteers, interns, and management personnel
(b) All devices (computers, mobile phones, tablets, servers) used for Foundation work
(c) All digital platforms, websites, cloud services, and data storage systems
(d) Third-party vendors or partners with access to SSW Foundation systems
3. Cyber Security Objectives SSW Foundation is committed to:
(a) Protecting sensitive data from unauthorized access
(b) Ensuring confidentiality, integrity, and availability of information
(c) Preventing cyberattacks, malware, phishing, and data breaches
(d) Maintaining secure digital operations across all departments
4. Roles & Responsibilities
4.1 Management Responsibilities
(a) Ensure implementation of cyber security standards
(b) Allocate resources for digital safety and training
(c) Approve cyber security updates and improvements
4.2 Employee & Volunteer Responsibilities All personnel must:
(a) Follow this Cyber Security Policy
(b) Use secure passwords and protect login credentials
(c) Report suspicious activity immediately
(d) Use Foundation-approved devices only for official work
4.3 IT / Technical Team Responsibilities
(a) Maintain updated systems, software, and antivirus programs
(b) Monitor network activity
(c) Perform regular security audits and backups
(d) Respond to security incidents quickly
5. Acceptable Use of Technology All users must:
(a) Use SSW Foundation devices responsibly
(b) Access the internet and email for legitimate work purposes
(c) Avoid visiting suspicious websites or downloading unauthorized files
(d) Not install unapproved software or applications
Any misuse of technology may result in disciplinary action.
(a) Passwords must be strong, unique, and changed every 90 days
(b) Multi-factor authentication (MFA) must be used wherever possible
(c) Passwords must never be shared or written down
(d) Access to systems is given only based on role and responsibility
7. Data Protection Measures SSW Foundation ensures:
(a) Personal and sensitive data is stored securely
(b) Access to data is limited to authorized personnel only
(c) Confidential files are encrypted and password-protected
(d) Backups are performed regularly and stored safely
Data collected from donors, beneficiaries, and employees is handled strictly according to privacy regulations.
8. Email, Internet, & Communication Safety All users must:
(a) Beware of phishing emails and suspicious links
(b) Verify the legitimacy of attachments before downloading
(c) Avoid sharing confidential information over unsecured channels
(d) Use official email accounts for Foundation work
Suspicious emails must be reported immediately to the IT team.
9. Device & Network Security
9.1 Devices
(a) All devices must have updated antivirus software
(b) Operating systems and applications must be regularly patched
(c) Lost or stolen devices must be reported immediately
9.2 Network
(a) Wi-Fi access must be secure and password-protected
(b) Unauthorized devices cannot join SSW Foundation networks
(c) Firewalls and intrusion detection systems must be maintained
(a) Only authorized cloud storage services may be used
(b) Sensitive documents must be encrypted before uploading
(c) Shared folders must be protected through permission-based access
11. Incident Reporting & Response In case of a cyber incident (hacking, data breach, virus, unauthorized access), the following steps must be followed:
11.1 Reporting
Report immediately to:
(a) Email: info@ssw.org.in
(b) Phone: +91 8894920820
11.2 Investigation
The IT team will:
(a) Assess the breach
(b) Contain and isolate affected systems
(c) Identify the cause and mitigate risks
11.3 Recovery
(a) Restore systems from backups
(b) Notify affected stakeholders (if necessary)
(c) Strengthen security measures to prevent recurrence
12. Third-Party & Vendor Security Vendors with access to SSW Foundation systems must:
(a) Sign confidentiality and data protection agreements
(b) Follow cyber security standards
(c) Use secure methods of transferring data
Non-compliant vendors may face termination of service agreements.
(a) Regular cyber security awareness training
(b) Updates on emerging cyber threats
(c) Guidance on safe use of technology and data handling
14. Policy Violations Any violation of this Cyber Security Policy may result in:
(a) Suspension of system access
(b) Disciplinary action
(c) Legal consequences (in severe cases)
15. Policy Review & Updates This Cyber Security Policy will be reviewed annually or whenever:
(a) New cyber threats emerge
(b) Laws and compliance requirements change
(c) System upgrades or technological changes occur
16. Contact Information For questions, reporting, or assistance regarding cyber security, contact:
SSW Foundation
Email: info@ssw.org.in
Phone: +91 8894920820
Landline: 01792-247508
Website: www.ssw.org.in
