Skip to main content

Security Policy

Policy

Cyber Security Policy of JPA
Download: Cyber Security Policy of JPA (PDF) or view the document in Flipbook format: Cyber Security Policy of JPA (Flip Book)

Data Protection
Cutting-edge technologies, including data encryption, are utilized to safeguard submitted data, and strict adherence to stringent security standards is enforced to prevent unauthorized access.

Storage Security
All electronic storage and transmission of personal data will be protected and stored using appropriate security technologies.

Encryption Manuals
Download: Encryption Manuals for Microsoft Office Word 2013, Microsoft Office Excel 2013, Adobe Acrobat 2007, Microsoft Office Excel 2007, Microsoft Office Word 2007, and Microsoft Office Word 2003.