Information Security Management Policy
Version: 1.3 Date: November 2024 Approved by: Directors
1. Purpose
This policy defines how we protect all information, systems, and data within our business against unauthorised access, loss, misuse, or corruption. It ensures compliance with the UK General Data Protection Regulation (UK GDPR), the Data Protection Act 2018, and our obligations as a registered organisation with the Information Commissioner’s Office (ICO).
2. Scope
This policy applies to all staff, contractors, and third parties who access or handle company information or systems, including remote workers. It covers:
-
All digital systems, networks, and storage devices
-
All business data (customer, supplier, financial, and operational)
-
All communications (email, messaging, and file transfer)
3. Responsibilities
-
Directors are responsible for overall information security governance and policy enforcement.
-
Managers ensure staff comply with this policy and that access rights are appropriate for job roles.
-
All employees are responsible for safeguarding company and customer data and reporting any suspected breach immediately.
4. Data Protection & Privacy
-
The company is registered with the Information Commissioner’s Office (ICO) under registration number 00018468637.
-
Personal data is processed only for legitimate business purposes and retained no longer than necessary.
-
All personal and sensitive data is stored securely, with access restricted to authorised personnel.
5. System & Network Security
-
All company systems are protected by enterprise-grade antivirus and firewall software, updated automatically.
-
All company laptops and remote devices use full-disk encryption and secure VPN connections when off-site.
-
Regular security patches, updates, and audits are performed to maintain system integrity.
-
Strong password policies and multi-factor authentication (MFA) are enforced wherever supported.
6. Communication & Data Transfer
-
All customer and supplier communications use encrypted email and messaging services.
-
Sensitive files are shared via secure, encrypted channels only (e.g., password-protected cloud storage or managed file-transfer systems).
-
Portable media (USB drives, external disks) are discouraged and must be encrypted if used.
7. Access Control
-
Access to systems and data is based on the principle of least privilege.
-
Accounts are immediately disabled when staff leave the company or change role.
-
Administrative access is restricted and logged.
8. Incident Management
-
Any suspected or actual data breach, cyberattack, or unauthorised access must be reported immediately to the IT Lead or Director.
-
Incidents are logged, investigated, and corrective actions implemented.
-
Where required, the ICO and affected individuals will be notified within legal timeframes.
9. Business Continuity & Backup
-
All key data is backed up daily to secure, off-site or cloud-based storage.
-
Backup systems are periodically tested for restoration integrity.
-
In the event of a system failure, defined recovery procedures are in place to restore operations quickly.
10. Training & Awareness
-
Staff receive induction and annual refreshers on data protection, phishing awareness, and IT security best practices.
-
Failure to follow this policy may result in disciplinary action.
11. Review & Compliance
-
This policy is reviewed annually or following any major change to our systems or regulations.
-
The company does not accept open-ended liability for malicious damage caused by third parties but commits to maintaining reasonable and effective security controls in line with industry best practice.
No Comments