Skip to Content

7th September 2014 — DIFC Courts Series 3 of 2014 (E-Disclosure & Best Practices) at DIFC Conference Centre.

7th September 2014 — DIFC Courts Series 3 of 2014 (E-Disclosure & Best Practices) at DIFC Conference Centre.

July 30, 2014

image_pdfimage_print

SAVE THE DATE!

DIFC Courts will host their 3rd lecture Series in 2014 (E-Disclosure & Best Practices) on September 7 at the DIFC Conference Centre.

Book your ticket today before the Early Bird price expires on August 14! : events@difccourts.ae

To view our previous lectures series, visit the DIFC Courts YouTube Channel: http://bit.ly/1ootORk

X

Privacy Policy

The Dispute Resolution Authority and all its affiliates are committed to preserve the confidentiality, integrity and availability of client data and personal information.

Dispute Resolution Authority and all its affiliates employees, vendors, contract workers, shall follow Information Security Management System in all the processes and technology.

  1. DRA's Top Management is committed to secure information of all our interested parties.
  2. Information security controls the policies, processes, and measures that are implemented by DRA in order to mitigate risks to an acceptable level, and to maximize opportunities in order to achieve its information security objectives.
  3. DRA and all its affiliates shall adopt a systematic approach to risk assessment and risk treatment.
  4. DRA is committed to provide information security awareness among team members and evaluate the competency of all its employees.
  5. DRA and all its affiliates shall protect personal information held by them in all its form.
  6. DRA and all its affiliates shall comply with all regulatory, legal and contractual requirements.
  7. DRA and all its affiliates shall provide a comprehensive Business Continuity Plan encompassing the locations within the scope of the ISMS.
  8. Information shall be made available to authorised persons as and when required.
  9. DRA’s Top Management is committed towards continual improvement in information security in all our processes through regular review of our information security management system.