Governance

Anti-Bribery Management System

ABCSP01 - IJM Anti-Bribery & Corruption Policy_v001

ABCSP02 - Code of Business Conduct for Third Party v2.0

ABCSP03 - Code of Conduct and Ethics for Employees v2.0

ABCSP05 - Dawn Raid Policy v2.0

ABMS Manual (Controlled Copy)

Kuantan Port Certificate ISO37001 CA22

Kuantan Port Anti Bribery Policy

Gift Policy

Kuantan Port does not prohibit gifts, hospitality and entertainment offered and/or received in the normal course of business.

 

All gifts received and/or offered shall be recorded in a Gift Register.

 

Type of gift, hospitality and entertainment strictly prohibited:

  • Illegal or in breach of any laws, regulations or rules;
  • Offered to a Government Official to facilitate or expedite a routine procedure;
  • Involving parties currently engaged in a tender or competitive bidding process;
  • Gifts made in cash or cash equivalent i.e. anything that can be easily converted to cash;
  • A “quid pro quo”, i.e. something offered in return of something else such as business advantage; and
  • Paid for personally to avoid having to declare or seek approval.

Whistleblowing

Whistleblowing Policy

Whistleblowing Form

Information Security

At Kuantan Port, protecting information is a vital part of our operations. As we work towards implementing an Information Security Management System (ISMS) in line with ISO/IEC:27001 standards, we aim to enhance data protection, build resilience, and maintain trust with our stakeholders.

 

What is ISMS?
ISMS is a structured framework of policies and controls aimed at ensuring the confidentiality, integrity, and availability of information. It enables us to systematically address risks and secure critical data.

 

Our Journey Toward Certification
Kuantan Port is actively working towards ISMS certification, which signifies adherence to international standards of information security. This journey involves evaluating and enhancing our system and procedures to ensure robust protection of data across all aspects of our operations.

 

By implementing ISMS, we aim to:

  • Protect against unauthorised access and data breaches.
  • Ensure compliance with legal and regulatory requirements.
  • Foster a culture of continuous security improvement.

Information Security Policy

Couldn’t Find The Contact You're Looking For?

Please contact our friendly team and we will reply you shortly.