Security Policy and Information Security Objectives's objective of managing information security is to ensure its core and supporting business operations continue to operate with minimal disruptions. shall ensure that all information that is used or stored by GiG has absolute integrity and availability. shall guarantee that all relevant information is managed and stored with appropriate confidentiality procedures in place.

+Read more

Information Security Policy

This Policy aims to protect the organisation’s information assets from all internal or external threats, deliberate or accidental. It is the policy of the organisation to ensure that:

  1. Confidential information must be accessed only by persons that require access, always following the principle of least privilege
  2. Stability, security and availability of our information must be kept consistent when affecting changes to systems.
  3. The integrity of our client information, as well as our business information, must be maintained at all times.
  4. To be the industry-leading platform and media provider delivering world-class security solutions to our iGaming partners and their customers.
  5. Compliance with Gaming Regulations and other legal requirements for our various licenses must always be in place and integrated within all our systems and business processes.

Information Security Risks

Risks at are managed through an Information Risk Management Framework adopted to ensure the timely identification and appropriate treatment of such risks, enabling the business to adopt a risk-based approach integrated into their decision-making processes. 


It is the responsibility of each member of staff to adhere to the Information Security Policy. All managers are directly responsible for implementing the Information Security requirements within their respective teams. The Management Representative has direct responsibility for designing, planning, implementing and operating the ISMS within

The Internal Audit Committee has direct responsibility for verifying the effectiveness of the information security management system. This Information Security Policy is subject to review when significant changes occur in the organization.

As Seen On:
  • international business times logo
  • Radar online logo
  • business matters
  • sigma logo
  • uk tech news logo
  • the irish post logo
  • business cloud logo
  • euro weekly news