Irishluck Header Background Security Policy

Information Security Objectives's objective of managing information security is to ensure its core and supporting business operations continue to operate with minimal disruptions. shall ensure that all information that is used or stored by GiG has absolute integrity and availability. shall guarantee that all relevant information is managed and stored with appropriate confidentiality procedures in place.

Information Security Policy

The purpose of this Policy is to protect the organization’s information assets from all threats, whether internal or external, deliberate or accidental.

It is the policy of the organization to ensure that:

  1. Confidential information must be accessed only by persons that require access, always following the principle of least privilege

  2. Stability, security and availability of our information must be kept consistent when affecting changes to systems

  3. The integrity of our client information, as well as our business information, must be maintained at all times

  4. To be the industry-leading platform and media provider delivering world-class security solutions to our iGaming partners and their customers

  5. Compliance with Gaming Regulations and other legal requirements for our various licenses must always be in place, integrated within all our systems and business processes

Information Security Risks

Risks at are managed through an Information Risk Management Framework adopted to ensure the timely identification and appropriate treatment of such risks, enabling the business to adopt a risk-based approach integrated into their decision making processes. 


It is the responsibility of each member of staff to adhere to the Information Security Policy. All managers are directly responsible for implementing the Information Security requirements within their respective teams.

The Management Representative has direct responsibility for designing, planning, implementing and operating the ISMS within

The Internal Audit Committee has direct responsibility for verifying the effectiveness of the information security management system.

This Information Security Policy is subject to review when significant changes occur in the organization.