Issue Date: January 2020
Next Review: January 2021


The company shall ensure appropriate technical and organisational measures are taken to prevent unauthorised or unlawful processing of personal data and commercially sensitive information, and to safeguard against accidental loss or destruction of, or damage to same.
To reassure our business partners and other interested parties of our commitment to protecting, securing and controlling systems and data, the company security controls are verified by independent experts and certified to the Government backed scheme ‘Cyber Essentials Plus’.

This Company will act to ensure that measures are implemented to protect the integrity of information, such measures shall include:

  • Protecting computer networks, all desktop and portable computers and handheld devices with userlog-in credentials, complex passwords and, where appropriate, biometrics.
  • Protecting networks from any damaging executables or scripts introduced by portable media, notlimited to, but such as memory sticks and optical storage.
  • Utilisation of Anti-Virus, Anti-Malware and Anti-Adware programs that are updated to the latestdatabase definitions.
  • Firewalls to protect against unwanted intrusion into networks, servers, computers and hand helddevices.
  • Maintaining information to ensure that it is accurate and complete.
  • Data centre back-ups shall be protected by 256bit AES encryption which prevents data being read byany unauthorised holder. Copies of back-ups are kept off-site using controlled and secure procedures.
  • Adherence to contracts with our clients that contain strict no-publicity clauses and thus photographicmedia taken on clients’ premises and sites will not be used or displayed without explicit permission todo so.
  • Communicating Confidentiality Agreements and Non-Disclosure Agreements to relevant personnel.
  • Promoting good security practices and training those whom we employ, providing guidance,awareness and advice on the importance of protecting confidential and sensitive information.
  • Limited and monitored employee access to Social media and networking.
  • Enacting disciplinary action against any employee who jeopardises the security and confidentiality ofinformation/data entrusted to the company.
  • Communication Logs that are only accessible by authorised personnel shall be retained for a period of2 weeks for the purpose of fault diagnosis and user support, after which time they are securelydeleted.

By implementing the above security measures, we shall comply with business, contractual, and regulatory requirements, including those of the General Data Protection Regulation. This policy is formulated with reference to International Standards ISO27001 – Information Security management systems requirements and ISO22301 – Business continuity management systems requirements.

This policy is communicated to our supply chain, relevant interested parties and all those working for, or on behalf of, the company.

Gerry Somers Managing Director