Policy Overview 

This policy is based on ISO 27001:2013 the recognised international standard for information  security. This standard ensures that the organisation complies with the following security  principles: 

  1. Confidentiality: all sensitive information will be protected from unauthorised  access or disclosure;
  2. Integrity: all information will be protected from accidental, malicious and  fraudulent alteration or destruction; and, 
  3. Availability: Information services will be available throughout the times agreed  with the users and be protected against accidental or malicious damage or  denial of service. 

F society is committed to ensuring that all these aspects of information security are  complied with to fulfil its statutory functions. 

Compliance with F society security policies and procedures is mandatory for all  personnel.  

The Chief Executive Officer (CEO) approves this policy. The Information Security Forum (ISF)  has the responsibility for ensuring that the policy is implemented and adhered to.  

The security policy confirms F society commitment to continuous improvement and  highlights the key areas to effectively secure its information.

Policy Detail

Senior Management Team Responsibilities’ and commitment

The Senior Management Team are committed to satisfy all applicable requirements within this policy and to the continual improvement of the ISMS, and therefore have established  this information security policy so that:

  1. it is appropriate to the purpose of the organization; 
  2. it includes information security objectives and provides the framework for setting continual information security objectives;

This information security policy shall be available as documented information; be communicated within the organization; and be available to interested parties, as  appropriate.

Leadership and commitment

Top management will continue to demonstrate leadership and commitment with respect to the information security management system by: 

  1. ensuring the information security policy and information security objectives are established and are compatible with the strategic business direction of the organization; 
  2. ensuring the integration of the information security management system requirements into the organization’s processes;
  3. ensuring that the resources needed for the information security management system are available; 
  4. communicating the importance of effective information security management and of conforming to the information security management system requirements;
  5. ensuring that the information security management system achieves its intended outcome(s); 
  6. directing and supporting persons to contribute to the effectiveness of the information security management system; 

Promoting continual improvement; and supporting other relevant management roles to demonstrate their leadership as it applies to their areas of responsibility. 

Information Security Objectives 

Information security objectives have been established and are compatible with the strategic direction of the organisation, the key objective is to work in line with the sections  of the best practice standard ISO 27001:2013 detailed below.  

Furthermore security objectives will be set by management as an ongoing task and at ISMS Management Review Meetings and an Information Security Objectives Policy will be  produced and implemented as part of the ISMS. 

Management Objectives for Information Security will be continually set and monitored to ensure they are achieved.  

f society will seek to continually improve the information security management system in line with a PLAN-DO-CHECK-ACT to improve process embedded within its ISMS. 

Organization of Information Security 

The importance attached to information security within f society is demonstrated by the existence of the Information Security Forum; the function of the Information Security  Forum is outlined below;  

  1. reviewing and progressing strategic security issues; 
  2. establishing relationships outside of F society with other security advisers;
  3. assessing the impact of new statutory or regulatory requirements imposed on f society;
  4. monitoring the effectiveness of the Information Security Management System  (“ISMS”) (e.g. from the results of Internal Audit reports and Security Incident  Reports); 
  5. recommending & endorsing changes to the ISMS;

The Information Security Forum meets regularly to address the above activities in order to assure the continuing effectiveness of f society ISMS. The review process is defined in the ISMS Information Security Forum Management Review Policy. 

f society has instituted the policy A06 Organization of Information Security Policy.

Human Resource Security

All employees must sign up to the Staff Handbook which requires them to work in accordance with all policies and procedures which includes information security specific  requirements. Furthermore an ‘Acceptable Use Policy’ ensures that employees are made aware that they are required to follow best practices regarding information security  established by F society. There is also a procedure for all employees that leave F society (including temporary and contract employees) to disable their network account and recover all items of property.  

All new employees (permanent, temporary and contractors) must be trained on procedures in the areas described above as part of their induction programme. Ongoing training must be provided in the form of a programme of regular updates and training  sessions by the Information Security Forum. 

f society has instituted the policy A07 Human Resource Security Policy.

Asset Management

f society information must be classified according to its sensitivity and an information owner assigned. The IT Team will maintain an information asset inventory which is also updated periodically, according to its risk profile and protected accordingly.

f society has instituted the policy A08 Asset Management Policy. 

Access Control

Employees must be aware of and must follow a number of controls and procedures, which exist to limit access to confidential information. The IT Team are responsible for both establishing and maintaining robust logical access controls.

f society has instituted the policy A09 Access Control Policy.

Cryptography

Where cryptographic controls are employed by F society a policy on the use of cryptographic controls for protection of information must be developed and implemented.

f society has instituted the policy A10 Encryption Policy.

Physical and Environmental Security

Staff must be aware of and must follow the detailed set of measures, controls and procedures that exist to ensure adequate control of physical security. These include.  

  1. building and individual alarm systems
  2. restricted access to the building and further restricted access within it
  3. secure lockers, drawers, safes and storage, fireproof storage 
  4. secure offsite backups and archiving 
  5. clear desk policy 
  6. clear screen policy 

f society has instituted the policy A11 Physical and Environmental Security Policy.

Operations Security

f society will ensure correct and secure operations of information processing facilities. 

f society has instituted the policy A12 Operations Security Policy.

Communications Security

Staff must be aware that the use of technology and communications are established, controlled and managed by the IT Team. The department is responsible for ensuring that the appropriate security measures and processes are in place. f society will ensure that security around the network, mobile and remote working are adequately protected. 

f society has instituted the policy A13 Communications Security Policy.

System Acquisition, Development and Maintenance 

The Development Team must ensure that the appropriate information security processes are included in all projects.

f society has instituted the policy A14 System Acquisition, Development and Maintenance.

Supplier Relationships 

Information security requirements for mitigating the risks associated with supplier’s access to the organization’s assets must be agreed with the supplier and documented. 

f society has instituted the policy A15 Supplier Relationships Policy.

Information Security Incident Management

Security incident management records must be centrally maintained, updated and monitored via the Case Management System. All employees must be aware of what constitutes an actual or potential security incident, how to report the incident and who to  report the incident to. 

The responsibility for the oversight of breaches of technical and physical security rests with the Chief Information Security Officer (CISO). 

f society has instituted the policy A16 Security Incident Management Policy.

Information Security Aspects of Business Continuity Management

The organization must ensure a consistent and effective approach to the management of major information security incidents, including communication on security events and  weaknesses and the implications for business continuity management.

f society has instituted the policy A17 Information Security Aspects of Business Continuity Management.

Compliance

f society must avoid breaches of legal, statutory, regulatory or contractual obligations related to information security and of any security requirements. 

f society must take technical and organizational measures to protect personal data against accidental or unlawful destruction, or accidental loss or alteration, and  unauthorized disclosure or access. In particular f society takes measures that are intended to ensure that:  

  1. Anyone managing and handling personal data understands that they are contractually responsible for following good data protection practice;
  2. Everyone managing and handling personal data is appropriately trained to do so; and
  3. Everyone managing and handling personal data is appropriately supervised. 

f society has instituted the policy A18 Compliance Policy.

Review 

This document must be reviewed at least annually by its ‘Document Owner’. The Document Owner must ensure the correct version number is applied to the document once the review  has taken place.

Enforcement

Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. 

Compliance

The document owner or a nominated proxy will conduct regular compliance reviews of this document using the following template to record evidence of the review, along with any  corrective or preventative actions that have been agreed as a result of non-compliance  occurrences. 

Date of Issue: 01 July 2021