Privacy & Security

£POA for Service

With online privacy and security so important in today's business world, our Associates can review, create and provide your organisation with the Policies, Procedures, Handbooks and Data Controls to reinforce your Information Strategy, Governance and Security.

Policy Management, Policy Compliance, Governance Management, Information Assurance, Single source of truth
Privacy Notice
Policy Management, Policy Compliance, Governance Management, Information Assurance, Single source of truth
Privacy Policy
Policy Management, Policy Compliance, Governance Management, Information Assurance, Single source of truth
Cyber Essentials
Policy Management, Policy Compliance, Governance Management, Information Assurance, Single source of truth
IASME Governance
Policy Management, Policy Compliance, Governance Management, Information Assurance, Single source of truth
ISO 27001
Policy Management, Policy Compliance, Governance Management, Information Assurance, Single source of truth
ISO 27001+ Family

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

About this Service

Did you know that?

  • there are only 5 steps you need to take to be accredited with Cyber Essentials!  With our guidance this level of protection isn’t that hard to achieve.
  • as part of your information strategy we can work with you to ensure your governance, risk and compliance aligns with your business goals and strategy.
  • a data privacy notice forms the baseline of your legal requirement to do business and places you in a strong position for data processor agreements and additional protection for your business and clients.

Through our partners we are committed to providing you with the best advice and content services to match your business requirements.

Why not take the first step and we can undertake an initial privacy and security health check.

This is an example of what we offer though our Associates:

Contracts of Employment

  • Data Privacy Notice.
  • Data Processor Agreements.
  • Information Strategy Advice.
  • Policies, Procedures, Handbooks and Data Control Design.
  • Cyber Essentials documentation.
  • Assistance with Vendor Security Questionnaires.

Contact us for a full list of services.

Cyber Security Handbook

  • easy to read and understand content that aligns with your business requirements allowing all staff to understand their obligations.
  • forms a workbook to assist in ongoing accreditation.

Policies and Procedures

Where a policy is listed we can provide the associated procedures, standards, handbooks and guidance to accompany them.

Asset Management
  • Acquisition of hardware, software and services
  • Backup & Restore
  • BYOD
  • Classification of information
  • Clear desk policy
  • Data sharing and exchange
  • Data Privacy Notice
  • Handling/disposal of computer equipment & information assets
  • Intellectual property
  • Media handling
  • New Computer Setup Policy
  • Ownership and responsibilities
  • Patch Management
  • Physical security
  • Risk Register
General
  • Access Control
  • Audit Policy
  • Business continuity, disaster recovery, and resilience
  • Information Security Policy
  • Information Security Strategy Guidance
  • Physical and environmental protection
  • Secure business operations
  • Security Policy
People
  • Acceptable use of computers
  • Architecture
  • Assessment
  • Change Management
  • Data and account access
  • Data Processor Agreement
  • GDPR Data protection
  • Exit Procedure
  • E-commerce and credit card handling
  • Governance
  • Incident and event management
  • Legal and regulatory compliance
  • Passwords and key management
  • Remote access - VPN
  • Remote working
  • Remote Server Access
  • Security Roles & Responsibilities.
  • Risk management
  • Special Privileges Register
  • Supplier Security Compliance
  • Third-party services
  • Training and awareness
Technology
  • Authorised Software Policy
  • Communications
  • Configuration management
  • Encryption
  • Internal Server Security
  • Cloud Computing
  • Internet Connection
  • Mobile devices
  • Monitoring
  • Protection against malicious software
  • Testing
The policies above can be purchased individually or as a suite at a discounted rate.

Consultancy

If you can't find what you are looking for, our Associates can offer bespoke Consultancy tailored to you business needs.

Create, review & update

Working through our Associates, we can create new or review and update your existing documentation in line with your organisational needs.

Free Consultation

Request a Free "Use Case" Review Today!

Talk to our experts and find out how we can help you.

contact us