Security Policy Statement

Security Policy Statement


Equal Moon Ltd will ensure the protection of all information assets within the custody of the Business.

High standards of confidentiality, integrity and availability of information will be maintained at all times.


Purpose

Purpose


Information is a major asset that Equal Moon Ltd has a responsibility and requirement to protect.

Protecting information assets is not simply limited to covering the stocks of information (electronic data or paper records) that the Organisation maintains. It also addresses the people that use them, the processes they follow and the physical computer equipment used to access them.

This Information Protection Policy addresses all these areas to ensure that high confidentiality, quality and availability standards of information are maintained.

The following policy details the basic requirements and responsibilities for the proper management of information assets at Equal Moon. The policy specifies the means of information handling and transfer within the Business.

Scope

Scope


This Information Protection Policy applies to all the systems, people and business processes that make up the Business's information systems. This includes all Executives, Committees, Departments, Partners, Employees, contractual third parties and agents of the Organisation who have access to Information Systems or information used for Equal Moon Ltd purposes.

Definition

Definition


This policy should be applied whenever Business Information Systems or information is used. Information can take many forms and includes, but is not limited to, the following:

  • Hard copy data printed or written on paper.
  • Data stored electronically.
  • Communications sent by post / courier or using electronic means.
  • Stored tape or video.
  • Speech

Risk

Risk


Equal Moon Ltd recognises that there are risks associated with users accessing and handling information in order to conduct official business.

This policy aims to mitigate the following risks:

  • the non-reporting of information security incidents
  • inadequate destruction of data
  • the loss of direct control of user access to information systems and facilities


Non-compliance with this policy could have a significant effect on the efficient operation of the organisation and may result in financial loss and an inability to provide necessary services to our customers.

Applying the Policy

Applying the Policy


For information on how to apply this policy, readers are advised to refer to Equal Moon Employee Handbook.

Policy Compliance

Policy Compliance


If any user is found to have breached this policy, they may be subject to Equal Moon’s disciplinary procedure. If a criminal offence is considered to have been committed further action may be taken to assist in the prosecution of the offender(s).

If you do not understand the implications of this policy or how it may apply to you, seek advice from the relevant Manager.

Policy Governance

Policy Governance


The following table identifies who within Equal Moon is Accountable, Responsible, Informed or Consulted with regards to this policy. The following definitions apply:

  • Responsible – the person(s) responsible for developing and implementing the policy.
  • Accountable – the person who has ultimate accountability and authority for the policy.
  • Consulted – the person(s) or groups to be consulted prior to final policy implementation or amendment.
  • Informed – the person(s) or groups to be informed after policy implementation or amendment.


Responsible Director
Accountable Managing Director
Consulted Office Manager
Informed All Employees

Review and Revision

Review and Revision


This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months.

Policy review will be undertaken by the Managing Director.