Information Security Policy

Version: 3

Last update: 2023-02-07

Document classification: Public

Purpose

The purpose of this document is to provide a description of the aims, objectives, and overall structure of the Information Security Management System (ISMS).

Introduction

Information Security can be defined as the protection of information and information systems from unauthorised access, use, disclosure, disruption, modification, or destruction.

Directors, employees, contractors, and any other workers employed and or engaged by us are referred to our Data Protection Policy and Data Breach Policy for further information. These policies are also designed to protect personal data and can be accessed by making a request to our Data Protection Officer and/or Managing Director.

For the avoidance of doubt, the term ‘mobile devices’ used in this policy refers to any removable media or mobile device that can store data. This includes, but is not limited to, laptops, tablets, digital cameras, memory sticks and smartphones.

Objectives

The objective of Information Security is to ensure business continuity and minimise business disruption by preventing and mitigating the impact of Information Security incidents.

Information assets are protected to ensure:

Scope

This Policy applies to all business functions within the scope of the ISMS and covers the information, information systems, networks, physical environment (including cloud based and directly hosted services) and products and services. The policy also applies in relation to paper records and information transmitted orally.

The Policy applies to all employees, contractors, and third parties supporting these business functions.

Responsibilities

Role Description
Managing Director Overall responsibility for Information Security. Responsible for ensuring that the appropriate levels of resources are made available to support the Information Security function.
Management Ensure their employees and contractors comply with this policy.
Information Security Manager Operational responsibility for procedural matters, legal compliance, maintenance and updating of documentation, promotion of security awareness, liaison with external organisations, incident investigation and management reporting.
Data Protection Officer Day-to-day responsibility for data protection.
IT Staff Responsibility for technical matters, including technical documentation, systems monitoring, technical incident investigation and liaison with technical contacts at external organisations.
Employees and Contractors Responsibility for safeguarding assets, including locations, hardware, software, systems, or information in their care and to report any suspected breach in security.

Principles

The Information Security Policy is how the Company meets the requirements of ISO/IEC 27001:2013 relating to its business risks. It specifies the requirements for the implementation of appropriate security controls to meet identified risks relating to the activities of the Company.

The implementation and continuing control of this system are fundamental to all work undertaken by the Company. The procedures established are adopted and practised by all employees at every level.

The Company has adopted the process approach for developing, implementing, and improving the effectiveness of its ISMS.

The Company, in adopting the process approach is committed to:

Information Security

Information Security aspects are considered in all daily activities, processes, plans, projects, contracts, and partnerships agreed by the Company.

Awareness and compliance to Information Security procedures as set out in the various policy and guideline documents are a requirement of employees and a clause to this effect is set out in the Contracts of Employment.

Copies of all Information Security Policies are made available to all employees.

Breach of the Information Security Policies and procedures by employees may result in disciplinary action, including dismissal.

Employees are advised and trained on general and specific aspects of Information Security, according to the requirements of their function within the Company. The Contract of Employment includes a condition covering confidentiality regarding Company business.

A Business Continuity Plan is in place. This is maintained, tested, and subjected to regular review.

Statutory and regulatory requirements are met and monitored for ongoing changes.

Further Policies and Directives such as those for access, acceptable use of email and the Internet, malware protection, backups, passwords, systems monitoring etc. are in place, maintained and are regularly reviewed.

This Information Security Policy is reviewed at least annually and may be amended to ensure its continuing viability, applicability, and legal compliance and with a view to achieving continual improvement in the ISMS.

The ISMS and Information Security operations are subject to continuous improvement through a program of internal and external audits and risk assessments.

Non-disclosure/Confidentiality Agreements are entered into as appropriate with third-party companies.