Econo Broking Private Limited |
Commercial Unit No. 201 to 202A, 2nd Floor, Dalal Street Commercial Co-operative Society limited, Block No. 53, Building No. 53 E, Zone-5, Road-5E, Gift City, Gandhinagar - 382 355. Gujarat, India |
TEL: (0278) 2413100. |
EMAIL: info@econobroking.com website: www.tradedealonline.com |
Policy for accepting new clients |
|
Mandatory Document dealing with Policy and Procedures Pursuant to SEBI's Circular dated Dec. 3, 2009 |
|
AUDIT TRAIL POLICY |
Audit Trails are maintained for both systems as well as application process by user activities and applications. |
The series of records of computer events about the operating systems. The applications and the user activities. The different audit trails are required to be maintained and audit trails provides information about computer systems and helps to audit of the computer system. |
The audit trails is used to establish individual accountability which has helped the user proper behavior. |
Any events to circumvent security policy will be revealed immediately and the appropriate actions are taken immediately. |
Any specific problem is always investigated by use of audit trails and system activity to find out what exactly happens. |
The event is reconstructed at appropriate level and it is analyzed to find any misuse or mischief created by any user and also to prevent unauthorized use of the system and the network on real time basis. It has also helped the virus attack and it has prevented the unacceptable system performance. The identification process immediately detects the unauthorized access was attempted and resultant damaged is assessed and controls which were attacked. |
System maintains several audit trails on concurrent basis which are recorded and saved. |
Further such records are reviewed on regular basis which also includes keystroke monitoring. These logs are preserved in the system. |
The review of audit trails has been utilize to find tune the system performance and to avoid any flow violations of security policy committed in application, this helps the misuse of the system by any individual user and all users remains accountable. |
The audit trails also examine the access control and its violation. |
The record of email application logs and its logs prevents the data pilferage the appropriate action after establishing the misuse and attempt of accessing the data in unauthorized way. |
System administrator is required to record the logs of user activities. The sensitive server applications and accessing the network is required to examine regularly. |
The attempts of log-in and unsuccessful log in are been checked. |
Application level audit trails are monitored and records are been maintained to examine the confidential information is not available to any unauthorized user. |
User audit trails the commands directly initiated by the user and also any unauthorized attempts and files and resources access any attempt to delete the log is viewed and noted very seriously. |
There is this audit logs are preserved for minimum 1 year and they are not available for review, access or monitor by anyone other than CEO or system administrator they are confidentially preserved. |
The audit trails are reviewed after any events or any software malfunctioning. |
The periodic review of audit trail data is being carried out by system administrator and under directions from CEO. |
Business Continuity & Contingency Plan |
Introduction |
In order to manage the unforeseen disaster and to come out of the ill effects of the same with least damages to business, business continuity plan (BCP ) and Disaster Recovery Plan ( DRP ) have been in place. Now it becomes a master document for the company to see through the ill facade of business uncertainty. |
These two master plans, which are put into use complement each other and through our organization's constant review of business and system processes, the plans shall get updated commensurate with the size of business and its growth. The plan has been arrived at after making detailed risk evaluation of the location(s) where from the businesses are operated. |
MOTTO: Contingency plans stated both, as part of BCP & DRP is active and fault-free. The plans relating to minor or routine electronic or communication failures are dealt with as part and parcel of Business Continuity Plan while contingency plan for the organization for severe calamites like Earthquake, Flood, Fire or any other natural or man made disaster are dealt with under DRP Plan. |
Objective of Surveillance
|
Areas of Surveillance
|
Surveillance
|
Business Continuity Plan |
We have ensured to create mirror image of entire setup for business contingencies and continuity plan to avoid any hazards at two different locations. |
We have planned growth for ensuing years to meet the growth requirement, the monitoring, re-structuring, re-defining the network requirement, hardware requirements and software requirements is being done continuously in consultation with in house IT teams sitting at both the location and outside IT experts. |
We have created appropriate hierarchy of management personnel and executives by providing appropriate training and giving right kind of exposure. We continuously focus our attention on training and development of Human Resources with us. We also ensure that the entire team of company remains positive and willing and able workforce for company by organizing several events time and again of their interests. |
We also have created business organization required for sincere needs with reference to the envisaged growth and sourcing or equipping our selves by hiring outside experts either on full time basis or on retainer basis to ensure that business continue in all circumstances. |
We keep vigil on market movements and hire expert advice on market movements and safeguard everyone including our branches and clients to ensure to keep manageable exposure to the market in the event market may go against their respective positions. |
We have always remained most competitive in offering our services to our clients and have kept vigil on market development in brokerage and depository service charges. We provide value added services like 'SPEED-e', Investment Advice and assistance to resolve their grievances on any investment issue, Internet Trading, Portfolio Management Advise at free of cost to remain competitive. |
Disaster Recovery Plan
|
Information Security Policy |
We have introduced the physical controls at server room, back office room by not permitting any unauthorized entry physically. |
No visitor is allowed in this area without prior approval and they are not allowed to carry any laptops, pen drives, floppies, cds etc., inside the secured areas. |
All employees are not allowed to carry any information in any form from the office while leaving the office. No direct access to Internet is provided to anyone other than authorized persons. All the computers are controlled, their activities are frequently viewed by senior officials time and again to ensure that no pilferage of any sensitive information. |
No third party vendors, contractors are permitted in restricted zone. Any meetings with this person if required are held at non secured zone office at the front office. |
Physical controls of office premises and facilities |
Physical security guard stationed at the entry point guards the office. |
No unauthorized entry is permitted. |
Suitable locking arrangements are maintained |
The keys remain with senior most directors of the Company. For alternative arrangement, the set of keys are kept at a secured place in vicinity of the office. |
Protecting against external environmental risks |
We have created earthquake proof structure at office premises. |
The Zero level is raised much higher than the ground level to ensure to avoid the damage due to floods. |
No open or vacant area is left in the office. |
Photographic video, audio or any recording equipments like cameras in mobile devices are not permitted inside the secured area. Even employees are not allowed to carry their mobile phones with camera to have full proof physical security of sensitive information. |
We have also ensured to discard all unused or unserviceable equipments, Records, papers not required are destroyed to avoid the unnecessary piling up of unused materials to avoid the dust, fire, explosion, vibration, chemical, electrical damage. |
Information Security policy and Network Security Policy |
Purpose The purpose of this policy is to out line acceptable use of computer equipment at company. These rules are in place to protect the entire company's team and company. In appropriate use expose risks including virus attack, compromise of network system and service and legal issues |
The Scope This policy covers employees,contracters,consultants, and temporaries including all personnel affiliated with third parties. This policy applies to all equipment that is owned or leased leased by company. |
Policy |
|
Security and proprietary information |
The interface for information contained on Internet/Intranet/Extranet-related system should be classified as either confidential or not confidential, defined by corporate confidentiality guideline, detail of which can be found in Human Resources policies. Examples of confidential information include but are not limited to: company private, corporate strategies, competitor |
|
Unacceptable Use |
The following activities are, in general, prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities (e.g. systems administration staff may have a need to disable the network access of a host if that host is disrupting production services) |
Under no circumstances is an employee of company authorized to engage in any activity that is illegal under local, state, federal or international law while utilizing company's owned resources. |
The lists below are by no means exhaustive, but attempt to provide a framework for activities which fall into the category of unacceptable use. |
System and Network Activities |
The following activities are strictly prohibited, with no exceptions: |
|
Email and Communication Activities
|
Enforcement |
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. |
We have introduced the physical controls at server room, back office room by not permitting any unauthorized entry physically. |
No visitor is allowed in this area without prior approval and they are not allowed to carry any laptops, pen drives, floppies, cds etc. inside the secured areas. |
All employees are not allowed to carry any information in any form from the office while leaving the office. No direct access to Internet is provided to anyone other than authorized persons. All the computers are controlled, their activities are frequently viewed by senior officials time and again to ensure that no pilferage of any sensitive information. |
No third party vendors, contractors are permitted in restricted zone. Any meeting with this person if required are held at non secured zone office at the front office. |
Physical controls of office premises and facilities |
Physical security guard stationed at the entry point guards the office. No unauthorized entry is permitted. |
Suitable locking arrangements are maintained. |
The keys remain with senior most directors of the Company. For alternative arrangement, the set of keys are kept at a secured place in vicinity of the office. |
Protecting against external environment risks |
We have created earthquake proof structure at office premises. |
The Zero level is raised much higher than the ground level to ensure to avoid damage due to floods.v No open or vacant area is left in the office. |
Photographic video, audio or any recording equipments like cameras in mobile devices are not permitted inside the secured area. Even employees are not allowed to carry their mobile phones with camera to have full proof physical security of sensitive information. |
We have also ensured to discard all unused ot unserviceable equipments, records, papers not required are destroyed to avoid the unnecessary piling up of unused materials to avoid the dust, fire, explosion, vibration, chemical, electrical damage. |
Closures of client account and dormant accounts |
In case client has not used his account for a period exceeding 12 months, his account shall be In Activated, freezed for further trading and his account shall be reactivated only after proper recording of reason for such non use in writing, after taking reactivation form along with all the required proof in support and after performing IPV (In Person Verification) of such clients. |
Any Client's account would be closed on the basis of closure request received from that client either on the basis of account closure forms received or on the basis of closure request received from that particular client's registered e-mail address maintained in our records. Any accounts where there is no trading activity over two years and having no significant balance or uncleared debit balance with no activities more than or equal to 6 months, such clients would be served with an advance notice of 30 days through e-mail on their registered e-mail address maintained in our records to close their account by submitting account closure forms and in absence of the same, accounts (trading and demat) of such clients would be closed by us on expiration of 30 days notice period and the balance amount on those account would be transferred to Kasar account or any other account as decided by the management of the company from time to time. |
Procedures and policies followed by the company |
We are following the procedure for different areas of operations as under: This procedure has been explained to all concerned, dealing officials and no deviations are permitted at their level if any deviations required they have to obtain approval from the director.
|