Information Security Policy

The information security policy outlines Vaxa’s overarching approach to information security management and signposts to specific sub-policies within our framework.

Purpose

This policy outlines Vaxa’s overarching approach to information security management and signposts to specific sub-policies within our framework.

Scope

The Information Security Policy applies to

  • All organisational and customer information, regardless of format.
  • All individuals associated with Vaxa, including temporary workers and external contractors.

Roles & Responsibilities

Who is responsible for doing what. This should refer to departments or roles instead of specific individuals.

RoleResponsibility
[Role][Responsibility]

Policy Statements, Standard, or Procedure

To ensure comprehensive information security management, Vaxa has opted to establish several detailed policies that support and complement this Information Security Policy.

Employees, contractors, and other stakeholders are required to familiarise themselves with these policies and adhere to their guidelines.

The related policies include:

PolicyDescription
Privacy PolicyOutlines how Vaxa collects, uses, discloses, and manages personal and sensitive information.
Acceptable Use PolicyDescribes the acceptable use of Vaxa’s information systems and resources.
Personnel Screening PolicyDetails the procedures for screening personnel before employment/engagement.
Access Control PolicyDescribes the requirements for granting access to Vaxa’s information systems and resources.
BYOD PolicyDescribes the requirements for using personal devices to access Vaxa’s information systems and resources.
Data Classification PolicyDetails measures and practices to classify data in compliance with relevant regulations and our risk tolerance, so that appropriate protections can be applied.
Data Retention PolicySets out the principles for retaining and disposing of data in a secure and compliant manner.
Mobile Device PolicyDescribes the requirements for using mobile devices to access Vaxa’s information systems and resources.
Password PolicyDescribes the requirements for creating and managing passwords.
Patching PolicyDescribes the requirements for keeping Vaxa’s information systems and resources up-to-date with security patches.
Secure Development PolicyOutlines best practices for developing and maintaining secure software applications.
Supplier Security PolicyEstablishes security requirements for engaging and managing third-party suppliers.
Asset Management PolicyDetails procedures for managing information assets throughout their lifecycle.
Cloud Security PolicyProvides guidelines for the secure use and management of cloud services.
Remote Working PolicySpecifies security measures and practices for employees working remotely.
Backup PolicyOutlines procedures and guidelines for data backup to ensure data availability and integrity.

Information Security Objectives

  • The ISG working group sets annual objectives, which are reviewed quarterly.
  • Objectives are available in the Handbook.

Training and Awareness

  • All staff and contractors must undergo security training to support their roles. The training must align with their job roles and the data they handle.
  • Induction for new employees includes mandatory security awareness.
  • Staff will be given regular training updates to maintain awareness of changing security threats.

Physical Security

  • Staff will secure and report lost security access passes.
  • Use physical restrictions such as keys or preferably swipe cards to manage access to restricted areas and equipment.
  • Always ensure visitors are accompanied on site.

Oral Communications

Use caution when communicating confidential information in public areas due to the risks of being overheard.

Third-Party Security

  • All third parties processing data on behalf of the organisation will undergo a risk assessment.
  • All third parties handling internal or confidential information must sign confidentiality agreements.
  • The organisation’s security policies will be communicated to third parties and contractually obligated as required.

Refer to our related third-party security policies;

  • Supplier Security Policy: This is for guidance on expectations around the approach to 3rd party security, with particular emphasis on personal data protection.

Personnel Screening

Personnel will undergo background checks before being employed. See the Personnel Screening Policy for more information.

Exceptions

Define how exceptions to the controlled document will be tracked.

Compliance & Monitoring

Define how compliance with the controlled document will be monitored and what checks will be performed (where applicable).

References

Procedure documents should map back to a governing policy or standard, and may relate to one or more procedures or other uncontrolled documentation. Policy documents may relate to an internal or external framework or legal requirement.