Information security policy and topic-specific policies are defined, approved by management, published, communicated to relevant personnel and reviewed at planned intervals.
We maintain a top-level Information Security Policy plus topic-specific policies (access control, cryptography, backup, incident response, supplier security, secure development, acceptable use, BCM, data classification). Each is reviewed annually or after a significant change and is approved by the CTO.