Skip to main content

Privacy, Continuity and Security Policy

PRIVACY

 

The Ghana Stock Exchange is committed to providing our visitors with a website that respects their privacy. We do not automatically gather any personal information from you, such as your name, phone number, e-mail, or address. This information is only obtained if you supply it voluntarily, usually through contacting us via e-mail.

If you choose to provide us with personal information – through contacting us via e-mail, or by filling out a form with your personal information and submitting it to us through our website – we use that information to respond to your message and to help us get you the information you have requested. We may also use personal information collected from our services, for statistical analysis to determine site usage.

We may share the information you give us with other market players if your inquiry relates to their field of specialization. Messages sent via the Internet can be intercepted. This Privacy Policy only covers the GSE website at https://gse.com.gh.

 

BUSINESS CONTINUITY AND RESILIENCE

At GSE, we view Business Continuity as a holistic management process that identifies potential threats to our organisation and their impacts to our business operations. Establishing a Business Continuity Management System provides us with a framework for building organisational resilience with the capability for an effective response that safeguards the interests of our key stakeholders, reputation, brand, and revenue-generating activities.

We are also committed to providing the best possible value and maintaining relationships with employees, stakeholders, business partners, and suppliers.

Our business continuity policy and programme enable us to meet the following objectives:

  • Ensure that minimum levels of critical services to achieve the organization’s business objectives are available during disruption.
  • Ensure the protection and safety of personnel in the event of disasters and hazardous incidents.
  • Provide a structured approach to managing business continuity risk.
  • Provide a strategic plan to respond and recover from risks that cannot be controlled or mitigated.
  • Provide business continuity and minimise damages and losses under adverse or abnormal conditions.
  • Reduce the negative impact on business objectives.
  • Improve collaboration between our interested parties in the event of a disruption.
  • Provide assurance to our stakeholders that they can depend on us in the event of a disruption.
  • Enhance our reputation.
  • Maintain product and service delivery in the event of a disruption.

 

INFORMATION SECURITY

We have established an Information Security Management System (ISMS) to provide a set of principles that guide our information security direction and how we manage the security of our information technology assets. Our Information Security Policy sets guidelines that enable us to proactively identify, mitigate, monitor, and manage information security threats, vulnerabilities, and risks to protect our technology assets, information, and data.

The objectives for implementing an Information Security Management System (ISMS) are as follows:

  • To ensure the confidentiality, integrity, and availability of critical information assets to support GSE’s business objectives.
  • To gain the trust of stakeholders who access our services and attract new stakeholders.
  • To globalise our operations and distinguish ourselves.
  • To add value to our organisation and demonstrate that we are committed to creating and sustaining a culture of security awareness that ensures the protection of our stakeholders’ information assets.

Our Information security requirements are aligned with our strategic goals. The ISMS will establish, maintain, and continually improve the mechanism for information transfer within and outside GSE and reduce information-related risks to acceptable levels.

GSE’s strategy and risk management framework provides the context for identifying, assessing, evaluating, and controlling information-related risks through appropriate risk management.