Quality Policy
Define and meet our Customer’s requirements. Ensure that our Policies and Procedures are clear and concise to reflect what we actually do. Monitor and analyze performance metrics and make any necessary changes or adjustments as appropriate effecting Customer programs, Customer satisfaction, the Quality Management System, and/or any related entities. Educate all employees about the linkages between their jobs and Customer satisfaction.
Ethics Policy
Developed on the basis of international agreements, the SKEDMIA Ethics Policy sets out the minimum standards of conduct expected from employees, & Students
The policy covers a wide range of topics including human rights standards, how to deal with conflicts of interest, how to avoid bribery, as well as general principles on how the company competes.
This policy applies to all employees of the Company, and to temporary workers, consultants, contractors, acting for, or on behalf of, the Company within the country and overseas. Every employee and associated person acting for, or on behalf of, the Company is responsible for maintaining the highest standards of business conduct. Any breach of this policy is likely to constitute a serious disciplinary, contractual and criminal matter for the individual concerned and may cause serious damage to the reputation and standing of the Company.
In compliance with statutory legislations and to embed commitment to integrity and honesty the Company will not sanction the following: –
Health & Safety Policy
The purpose of this Policy is to clarify rulemaking procedures from the Office of the President, and the procedure for the development, review and approval of policies initiated at other levels or by other bodies in the SKEDMIA.
Example 2 (For administrative regulations):
This policy has been established to ensure consistency of all external advertisement of SKEDMIA positions. External advertisements are supplemental to internal postings and recruitment/hiring policy requirements. Recruitment resources such as businesses, organizations, professional associations, alumni groups, and trade journals can be utilized by departments to aid in the search process. S/C/Ds needing assistance in identifying other potential recruitment resources may contact Human Resources Client Services.
Each employee is an important contributor to the SKEDMIA’S mission and each employee is needed at work to assist in accomplishment of the SKEDMIA’S goals and objectives. community.
To ensure effective and efficient operations of the SKEDMIA and provide the best possible work environment to employees, the SKEDMIA expects employees to adhere to the attendance standards as outlined in this policy.
Covid 19 Policy
COVID-19 spread is emotionally challenging for many people, changing day-to-day life in unprecedented ways. All sections of society – including employers and employees – should play a role to protect themselves and each other and help prevent further spread of the disease
Cyber Security Policy
We at SKEDMIA respect your privacy and we want you to understand that how we collect, use, and share data about you. This Privacy Policy covers our data collection practices and describes your rights to access, correct, or restrict our use of your personal data.
Unless we link to a different policy or state otherwise, this Privacy Policy applies when you visit or use the SKEDMIA websites, mobile applications.
Cyber Risk Management
Information is a valuable asset and access to it must be managed with care to ensure that confidentiality, integrity and availability are maintained.
To understand the likelihood and impact of its information security risks, the SKEDMIA has developed a risk management framework. This framework is employed to ensure that the risks associated with any particular asset or activity are consistently measured and addressed.
1 Scope
The information security risk management framework and its supporting controls, processes and procedures apply to all assets owned, working with and operated by the SKEDMIA.
The information security risk management framework and its supporting controls, processes and procedures also apply to all individuals who have access to SKEDMIA and technologies, including external parties that provide information processing services to the SKEDMIA
2 Objectives
This policy, its associated procedures, processes and guidance provide a common framework, methodology and organised approach to information security risk management across the SKEDMIA. This ensures that risk can be understood in a reliable and consistent manner.
The SKEDMIA’S information risk management objectives are that:
3 Risk Management Methodology
Information security risks are managed in line with the SKEDMIA’S Risk Management Manual and governance, as described below.
Along with this, information security risks are identified, managed, assessed and treated using methodologies from ISO/IEC 27005:2018 and NIST SP 800 30 where appropriate.
The Risk Management Framework outlines how these individual methodologies are employed to ensure the management of information security risk is comprehensive, appropriate and consistent.
4 Risk Appetite
Risk appetite is the level of tolerance the SKEDMIA has for threats and vulnerabilities. The SKEDMIA has a stated low appetite for mission critical risks, however, in order to conduct research and continue to attract high quality students, the SKEDMIA has to experiment and innovate in both activities with a degree of risk attached.
IT Services underpin and enable many activities and IT Services’ appetite for risk reflects the overall SKEDMIA approach: For mission critical or high importance services, IT Services has a low risk appetite. For medium or low importance services, IT Services has a moderate risk appetite..
In all cases where risk is tolerated or transferred it will need to be documented, justified and approved, by an appropriate staff member.
5 Risk Management Framework
The Risk Management Framework outlines each step of the information security risk lifecycle, including how risks are identified, assessed, treated, monitored, reviewed and reported.
This framework defines how information security risks are practically measured and managed, ensuring consistently.
6 Risk Registers
The results of various risk assessments, including the high level annual information security risk assessment will be recorded and tracked in the Information Security Risk Register.
Where relevant and appropriate, risks will be communicated to departments and faculties to be logged, tracked and escalated in their local risk registers.
The content and structure of various risk registers are detailed in the Risk Management Framework.
7 Policy Development and Implementation
The effectiveness of the policy and the information security risk framework will be continually measured to ensure they are fit for purpose, consistent and sustainable.
This will be performed through an annual review of the framework’s effectiveness in line with the attributes mentioned above. The policy will be updated to reflect any approved change to the framework.
Privacy Policy
Thank you for joining the world’s largest online learning marketplace. We at SKEDMIA respect your privacy and want you to understand how we collect, use, and share data about you. This Privacy Policy covers our data collection practices and describes your rights to access, correct, or restrict our use of your personal data.
SKEDMIA needs to collect and use certain types of information about its students, its staff and third parties with whom it deals in order to operate. This includes current, past and prospective employees, clients and other with whom it communicates. The personal information must be dealt with properly however it is collected, recorded and used , whether on papers , in computer software or recorded on other material. We regard the lawful and correct treatment of personal information by SKEDMIA as very important to successful operations and to maintaining confidence between those with whom we deal and ourselves. We ensure that our organization treats personal information lawfully and correctly.
Specifically, the principles require that personal information:
Therefore, SKEDMIA will through appropriate management, strict application of criteria and control:
In addition SKEDMIA will ensure that:
There is someone with specific responsibility for data protection in the organization (currently the nominated person is IT Head) every one managing and handling personal information understands that they are contractually responsible for the following good data protection practice
Refund Policy
When making a request for refund, clients will be asked to provide all relevant evidence to support their claim.
SKEDMIA will review the refund request and based on the evidence provided, it will take one of the following decisions:
Please note that:
If the reimbursement procedure involves fees, these fees will also be deducted from the reimbursement.
If you want to submit a refund request, please download the Refund request document and send it to the following email address:
Once your request for a refund is reviewed, an email will be sent to you with notice that we have received your request. You also will be notified whether your request for a refund is approved or rejected.