Info Security Report
Info Security Report
LI-ONE RESTAURANTS
1.INTRODUCTION
1.1: Scope
1.2: Objectives
1.3: Principles
2. Information security objectives
2.3: Legislation
2.4: Privacy
2.5: Insurance
3. Responsibilities
4. General Controls
5. Consequences
Information Security
2
1.INTRODUCTION
This document has li-ones Information Security and the use of its IT policy and procedures, and
This information security policy outlines our approach to information security management. It
provides the guiding principles and responsibilities necessary to safeguard the security of the
Hotels information systems. Supporting policies, codes of practice, procedures and guidelines
As a company our objective is to ensure that when guests are with us, they feel comfortable,
private, and secure. There is a considerable focus on enforcing physical security within the hotel,
doors have smart locks, and rooms have electronic safes with pin codes that can be set by the
guest. However, we strive to ensure that they have the same level of protection even when they
1.1: Scope
This Policy applies to all faculty, staff and third-party Agents of the University as well as any
other University affiliate, including students, who are authorized to access Institutional Data.
1.2: Objectives
The objective of this Information Security and Acceptable Use of IT Policy is to protect the
company’s information assets from all threats, whether internal or external, deliberate, or
accidental, to ensure business continuity, minimize business damage and maximize return on
This policy is critical for providing assurance to funders, regulators, auditors, and governments
that we take seriously the confidentiality, integrity and availability of data placed in its care.
1.3: Principles
There are three main principles to this policy:
4
Confidentiality: data and information are protected from unauthorized access. Guest
information is not disclosed to other guests or employees, not employees should have the
Integrity: Data is intact, complete, and accurate. The staff should record and enter the
right data for guests, data is not to be tampered with by people without the correct
privileges.
2.1:Threats
The following are some of the leading threats faced by the hotel and leisure industry as of
January 2021:
malicious attack towards an organization. The primary objective being to gain user
Wi-Fi-based attacks: Unless secured, traditional Wi-Fi as these systems are vulnerable
and malicious actors (This could be insiders such as employees or hotel guests or external
factors such as hackers, cyber criminals etc.) could use them to breach into corporate
conduct a range of malware injection activities. Within such attacks, hackers utilize botnets
of compromised networks to flood critical systems (e.g., online ticket booking) with traffic,
which results in a crash of the platform. Attackers may also ask for a ransom amount from
the authorities to prevent disruption of such critical systems. Ransomware: These attacks
have grown in popularity in the last few years, and we have some real crippling attacks
wherein the attackers gain access to the organizations system and encrypts the data. The
businesses are then asked to pay a ransom to be able to get a key to decrypt the data.
Data Leakage: These are attacks where malicious actor gain access to your systems and stay
there as much as possible and try to identify and exfiltrate critical data outside the organization.
The data includes business data as well as guests’ information (personal / financial (credit cards)
etc.)
i.e., Comfort, Privacy and Security. Some of the information we hold is personal information
such as details about passport, any other identity cards, credit cards, personal or business
addresses, travel itineraries, personal likes, and habits etc. A malicious actor can use such
financial frauds amongst other things. As such the business itself is at risk as they may become
1. Loss of personal data relating to guests, resulting in breaches of privacy law obligations and,
2. Loss of confidential information, which may amount to a breach of contract and/or loss of
commercial advantage.
systems.
6
4. Financial fraud with customer credit card information, including bookings made using stolen
identities.
2.3: Legislation
The management system has defined controls in line with regulatory requirements. The
2.4: Privacy
Protection of Personal Information is a key regulatory requirement both locally as well as
internationally. It is therefore key to note that our systems have been designed in line with the
privacy regulatory requirement, which includes: The regulation constitutes of a number of rights
to the individuals such as Right to be forgotten, right to information, Need for consent etc. To
enable this, we will only collect data that is required for the business and share only what needs
reduction in risk by reducing the amount of data that is collected, ensuring its usage based on the
consent received and disposal of data as soon as the need has been finished.
2.5: Insurance
A data security breach is an incident in which the confidentiality, integrity, or availability of data
(often stored electronically) is compromised, such that the data is vulnerable to access or
acquisition by unauthorized persons. Hackers or malevolent individuals do not cause all data
breaches; some are caused by individual carelessness, such as leaving an unsecured laptop
somewhere and exposing the data to an unsecured environment. With personally identifiable
information — such as QID numbers, financial account numbers or access credentials — the loss
of confidentiality potentially can lead to identity theft, unauthorized credit or debit card charges,
and bank account fraud. Such may lead to experience of direct and indirect losses, including
fines and penalties imposed by the card associations. The company may also face third-party
liability in the form of lawsuits and claims, regulatory fines, and, in some cases, even civil and
criminal penalties.
Cyber Insurance ensures that in case of a breach, an organization can manage some of the
liabilities at least from a financial perspective. This makes sense in a strong regulatory
environment where an organization may be liable of disciplinary fines and / or costs related to
breach notification.
The scope of coverage can be tailored to a variety of risk scenarios and should cover the
following: Asset Liability, Network Security Liability, Privacy Liability, Regulatory Defense
and Penalties, Network Extortion, Network Business Interruption and Breach Event Expenses.
3. Responsibilities
Tribe Hotels IT Directors hold ultimate responsibility for information security.
8
Information Security Officer has responsibility for information security and acting as the point of
Data Protection Officer will support the Information Security Officer by ensuring effective
engagement and communication of any data related issues that may compromise Information
Procurement Officer is responsible for ensuring contracts are sufficiently robust and clear about
the responsibilities of third party/partners and instigating periodical checks to assess compliance.
Managers are responsible for information security in their area and must ensure all permanent
and temporary staff and contractors are aware of their responsibilities and take action to instigate
All Staff must comply with this policy including the maintenance of data confidentiality and data
integrity
All Managers must give their full backing to all the guidelines and procedures as set out and
- They are to ensure that inexperienced staff who require access to ICT are provided with
- Managers must also take responsibility to ensure that all inexperienced staff receive a
briefing on this policy as part of their induction and formally sign the Acknowledgement
4. General Controls
The company’s IT team should take these considerations into account, but hotel guests are also
2. Implement Threat intelligence feeds that include a data breach notification System Which
provide notification and real-time threats reports that show that hotel guests have been targeted
3. Guests are to use VPN services to block attacks whenever connecting to the hotel’s WIFI. This
is because VPNs encrypt all digital communications and prevent sensitive data from being
intercepted.
4. Use HTTPS which implies that the browsers on uses are secure.
10
5. Consequences
To ensure that the organization remains complaint with the law and the parties involves are
compliant with the above policy document the following will be implemented in case of a
breach:
Fine
Jail sentence
Each case of breach by the employees, by the guest or by third parties will be severely punished
to ensure that we follow the law and achieve the organizations goals.