ISMS Information Security Policy

Policy Overview

This policy is based on ISO 27001:2013, the recognized international standard for Information Security. This standard ensures that "we" or when in the scope of other "organisations", comply with the following security principles:

  • Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
  • Integrity: Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.
  • Availability: Ensuring timely and reliable access to and use of information by authorized users.

We are committed to ensuring that all these aspects of Information Security are complied with to fulfil its statutory functions. Compliance with our security policies and procedures are mandatory for all participants. Angelique Dawnbringer (owner) approves this policy and has empowered a forum with the responsibility for ensuring the policy is implemented and adhered to. That said, we have legal, contractual, and ethical obligations to protect the confidentiality, integrity, and availability of our systems and data.

This policy strikes a balance between protecting our systems and data, maintaining the open environment that enables us to excel, innovate, and collaborate; while ensuring that we achieve our goals and can prioritize our work. It also confirms our commitment to continuous improvement and highlights the key areas to effectively secure our own and entrusted information, whether confidential or personal information.

Policy Detail

Our responsibilities' and commitment

We are committed to satisfy all applicable requirements within this policy and to the continual improvement of the ISMS, and therefore have established this policy so that:

  • It is appropriate to the purpose;
  • It is platform and technology neutral;
  • It includes information security objectives correlated to our objectives and provides the framework for addressing information security objectives over time;

This policy is available on our website, and communicated as open as such; so it is available to anyone who might be interested or has a need for it.

Leadership and commitment

We (inter alia: Angelique Dawnbringer), will continue to demonstrate leadership and commitment concerning the ISMS by:

  • Ensuring the information Security Policy and Information Security Objectives are established and aligned with the strategic direction of the projects;
  • Ensuring the integration of the ISMS requirements into our processes;
  • Ensuring that the resources needed for the ISMS are available;
  • Communicating the importance of effective Information Security Management and of conforming to the ISMS requirements;
  • Ensuring that the ISMS follows and achieves its intended vision and goals;
  • Directing and supporting persons to contribute to the effectiveness of the ISMS;
  • Continuous Improvement and supporting others do the same.

Information Security Objectives

This Information Security Policy is supported and supplemented by specific operational, procedural and technical standards. These Standards are mandatory and enforced in the same manner as this policy. They are aligned and compatible with our goals and vision. For transparency and auditability, we have documented such in line with ISO 27001. Security Objectives and Security Programs will be set by "us" as an ongoing task and ISMS reviews are performed through continuous refinement and systematic improvement following the "Just Barely Good Enough" principle. Such improvement is in line with PDCA.

The organisation of Information Security

- (pending review)

Human Resource Security

- (pending review)

Asset Management

- (pending review)

Access Control

- (pending review)

Cryptography

- (pending review)

Physical and Environmental Security

- (pending review)

Operations Security

We will ensure correct and secure operations of information processing.

Communications Security

Everyone must be aware that the use of technology and communications are established, controlled and managed by the IT Team. They are responsible for ensuring appropriate security measures and processes are in place to protect those assets. They will ensure that security around the network, mobile and remote working are sufficiently protected.

It is everyone's responsibility to use the technology in a secure way as such in line with the Acceptable Use Policy. Any other usage or self-provisioning of systems must adhere to our Information Security Standards, including those of Bring-Your-Own-Device nature. While these are not always supported by the IT-Team, they require Mobile Device Management and are treated as a non-corporate-yet-personal asset with network, system and information access commensurated with the degree of risk (against strategy and risk-appetite).

System Acquisition, Development and Maintenance

- (pending review)

Vendor / Supplier Relationships

- (pending review)

Information Security Incident Management

- (pending review)

Business Continuity Management

- (pending review)

Compliance

We must avoid breaches regardless of legal, statutory or contractual obligations related to Information Security and of any Security requirements.

This means we must put in place Technical and Organisational measures e.g. performing any such activities required; regarding access, manage, transfer, process, store, retain, and destroy information or data; to disclose and notify affected parties required and under applicable information privacy and data protection laws; and to safeguard information or data to ensure availability, integrity, confidentiality, and privacy, or notify individuals of any failure to safeguard such information or data.

In particular, this means that we ensure that:

  • Only "Authorized Parties" are granted access to Personal Information and Confidential Information;
  • We provide "Authorized Parties" who will have access to Personal Information and Confidential Information with supervision, guidance, and training on the Technical and Organizational Security Measures.
  • We provide specialized training specific to "Authorized Parties" with significant security duties, including but not limited to human resources or information technology functions, and any technology administrator function.
  • Everyone is aware and knows that Security is everyone's responsibility

"Authorized Party" or "Authorized Parties" means anyone, mainly internally or an "Authorized Employee" of a "Vendor" or "Third Party", who has a specific need to know or otherwise accesses Personal Information and Confidential Information to enable us to perform our obligations, and who are bound in writing by confidentiality and other obligations sufficient to protect Personal Information and Confidential Information.

Modification & Review

This document must be reviewed at least annually. It is treated as a living document with no designated expiration-date but has a best-before date of 3 months after your last visit. We reserve the right to update or modify this Information Security Policy & imposing requirements from time to time; by posting/updating to the latest version. Henceforth we recommend to always consult this page as only the latest version is valid and applicable for use.

Enforcement

Angelique Dawnbringer is responsible for the development, implementation, monitoring, and enforcement of the information security program. Violations of this policy may result in suspension or revocation of computer accounts and access to networks and/or data including wiping or erasure of systems. Also, the connectivity of machines and servers that do not comply with this policy or its associated Standards may be limited or removed.

Final Remarks

If you have any questions about this "Policy", please contact us.