make your free information security policy
what we'll cover
what is an information security policy?
an information security policy details a business’ rules and procedures regarding information security (eg how any security measures are implemented and how compliance is monitored).
information security policies act to protect sensitive business information and data from any unauthorised access. they are also used to ensure staff members know about the importance of information security and the steps they must take to ensure that any information held by a business is kept secure.
when should i use an information security policy?
use this information security policy:
-
to ensure any information held by your business is secure
-
to comply with your obligations under the uk general data protection regulation (gdpr) and data protection act 2018 (dpa)
-
to inform staff about information security
-
to set out the consequences of failing to keep information secure
-
only for staff based in england, wales or scotland
sample information security policy
the terms in your document will update based on the information you provide
about information security policies
learn more about making your information security policy
-
how to make an information security policy
making an information security policy online is simple. just answer a few questions and 2022世界杯32强抽签时间 will build your document for you. when you have all of the details prepared in advance, making your document is a quick and easy process.
to make your information security policy, you will need the following information:
employer details
-
what is the employer’s name?
-
who has overall responsibility for data protection compliance and what are their details?
policies
-
what policies does the employer have in place?
-
are the employer's policies available online? if so, what are the urls of the policies?
security measures
-
what security measures are in place to protect personal data?
-
who is responsible for computers and it?
-
how is training on information security delivered?
data transfers
-
can personal data be transferred outside of the uk?
-
-
common terms in an information security policy
an information security policy is used to set out how a business protects information and ensures that it is kept secure. to do this, this information security policy covers:
statement of policy
this section provides a brief overview of the information security policy, why it is being adopted and to whom it applies. it also highlights the fact that all staff members should familiarise themselves with the policy.
purpose of policy
this section provides more detail on why the information security policy is being adopted. specifically, it highlights that the policy is crucial for the employer’s data protection compliance. this section also sets out that the policy does not form part of any employment contracts and can, therefore, be changed by the employer at their discretion.
roles and responsibilities
this section sets out that all staff members have a responsibility for information security and appoints someone with overall responsibility for the policy and clarifies what their duties include.
scope of this policy
this section sets out what forms of information and communication the policy applies to. it also provides details of any policies which supplement the information security policy.
general principles
this section sets out the general principles of the information security policy, including the importance of maintaining the security of all information.
information management
this section details how any personal data (ie information about individuals who can be identified from the data, eg names and addresses) must be processed and what steps need to be taken to ensure the safety of this data.
human resources (hr) information
this section sets out that, due to the internal confidentiality of personnel files, all access to such files will be limited to the hr department.
access to offices and information
this section details how offices and all information kept in offices is kept secure. it also sets out how visitors should act when on the premises.
computers and it
this section sets out how computers and it systems are kept secure and how the security of any digital information is ensured.
communications and transfer of information
this section sets out how staff are to ensure the security and confidentiality of communications, especially when not in the office.
personal email and cloud storage accounts
this section explains that personal email accounts and personal cloud storage accounts should not be used for work purposes. it also highlights that staff members should consult with the relevant department (eg an it department) if they need to transfer large amounts of data.
working from home
this section provides details on maintaining information security when staff work from home.
transfer to third parties
this section sets out when third-party service providers (eg businesses offering cloud storage services) may be engaged. it also clarifies that staff members involved in dealing with third-party service providers should speak to the individual with overall responsibility for data protection compliance before entering into any contracts.
international data transfers
this section sets out whether personal data may be transferred to parties outside the uk (eg to the european economic area (eea)).
training
this section provides details of the types of training that are provided to staff members. this includes how such training will be delivered and how often.
reporting data breaches
this section highlights that all staff members have an obligation to report actual or potential data breaches and sets out why this is the case.
consequences of non-compliance
this section sets out the potential consequences of failing to comply with this policy. these include disciplinary action and even dismissal.
if you want your information security policy to include further or more detailed provisions, you can edit your document. however, if you do this, you may want a lawyer to review or change the information security policy for you, to make sure it complies with all relevant laws and meets your specific needs. ask a lawyer for assistance.
-
legal tips for making an information security policy
ensure that the business complies with the commitments made in the policy
recording how your business will meet its data protection and information security obligations in writing is a fundamental first step toward compliance. however, simply having an information security policy in place is not enough to demonstrate that you’ve actually complied with your legal obligations. you need to ensure that the steps set out in your policy are followed. it is, therefore, crucial that you make and follow a clear plan for implementing the information security policy.
consider what documents are needed to supplement this policy
this information security policy should be supported by a variety of different documents, depending on your business’ needs. for example:
-
a data protection and data security policy - this is an essential policy setting out the policies and procedures the business complies with when dealing with staff personal information and personal data
-
an employee privacy notice and/or consultant privacy notice - detailing how the business collects, uses, retains and discloses staff and/or consultants’ personal information. this document allows employers to be transparent and open about the information collected from staff/consultants
-
a communications and use of equipment policy - setting out the rules and procedures for accessing communications and it equipment and resources and for monitoring staff in the workplace
-
a data processing agreement (dpa) - ensuring compliance with the gdpr whenever any data processing is outsourced to a third-party service provider
-
a data retention policy - setting out for how long the business will keep personal data and how any data will be disposed of when it's no longer needed
-
a working from home policy - setting out the business' approach to home working
-
a subject access requests policy - setting out how subject access requests can be made and how the business handles such requests. ask a lawyer if you need a subject access requests policy
understand when to seek advice from a lawyer
ask a lawyer if:
-
you work in a regulated sector
-
this policy doesn’t meet your needs and you’d like a bespoke version drafted
-
you have staff based outside england, wales and scotland
-
information security policy faqs
-
what is included in an information security policy?
this information security policy template covers:
-
the purpose of the policy
-
who has responsibility for information security
-
general principles relating to information security and data protection
-
what steps the business takes to protect information, including personal data
-
how access to offices is secured
-
what computer and it measures are in place to protect information
-
how working from home affects information security
-
transfers of information, including international data transfers
-
consequences of a breach of this policy
-
-
why do i need an information security policy?
having an information security policy in place shows your commitment to ensuring the security of information. this includes protecting your business from security concerns, such as minimising and preventing potential security incidents like leaks and data breaches. it also helps you to comply with the relevant data protection legislation.
adopting an information security policy policy also helps you ensure a consistent way of addressing and managing any information security risks your business may face.
for more information, read information security and cyber security.
-
what is information security?
information security (or ‘infosec’) is the practice of protecting information held by a business. this includes confidential information (eg trade secrets), personal data (eg customer names and addresses), sensitive personal data (eg information about staff members’ trade union membership or health) and business information (ie business-related information that isn’t personal data).
information security protects the information a business holds against unauthorised activities (eg unauthorised changes). further, under the gdpr and the dpa, you may only process (eg receive and store) personal data in a way that ensures the appropriate security of the data. this means adopting certain appropriate security measures to protect personal data. an information security policy helps you comply with these obligations.
for more information, read information security and cyber security.
-
who should be responsible for the information security policy?
while all staff are responsible for information security within your business, one person should have overall responsibility for this information security policy. who this person should be will depend on your business. they will be either:
-
your business’ data protection officer (dpo) - the person in the business with operational responsibility for data protection compliance, or
-
a person other than the dpo - this person will need to take practical steps to comply with data protection laws and so should be someone who can understand and apply the relevant legal rules (eg an information security manager)
-
-
what are security measures?
security measures are the steps your business takes to protect information from being accidentally or deliberately compromised. security measures include:
-
organisational measures - ensuring data security within your business (eg having an employee responsible for information security and for entering into data processing agreements)
-
technical measures - including physical measures (eg how the workplace is protected) and cybersecurity (eg how network security is ensured)
for more information, read data protection principles.
-
-
what security measures should be in place?
which security measures are needed to protect information will depend on the specifics of your business. examples of security measures include:
-
encrypting personal data - encoding the personal data in such a way that only authorised users can access it. for more information, see the information commissioner’s office’s (ico’s) guidance
-
pseudonymising personal data - removing or replacing information from personal data that identifies a specific individual (eg replacing a name with a reference number). for more information, see the ico’s guidance
-
implementing dual-factor authentication (also known as ‘two-factor authentication’ or ‘2fa’) - securing access to systems and devices by requiring two methods of verifying someone’s identity (eg requiring a username and password and, additionally, verification through an app)
-
using strong passwords to protect devices
-
password protecting documents containing sensitive personal data
see the ico's guidance for more information on password protection and dual-factor authentication.
to determine what security measures your business should have in place, consider what measures you may need to:
-
ensure the ongoing confidentiality, integrity, availability and resilience of business systems (eg computer systems)
-
restore the availability of, and access to, information in a timely manner in the event of a physical or technical incident
-
test the effectiveness of your business’ security measures
for more information, read information security and cyber security. consider using the ico’s checklist to assess your business’ information security compliance.
-
-
what are the consequences of not complying with this information security policy?
if staff don’t comply with the information security policy, they may be subject to disciplinary action (in accordance with your disciplinary procedure). in certain circumstances, depending on the severity of the situation, non-compliance may result in the dismissal of that person. this applies to all staff, including those who hold senior positions (eg directors).
our quality guarantee
we guarantee our service is safe and secure, and that properly signed 2022世界杯32强抽签时间 documents are legally enforceable under uk laws.
need help? no problem!
ask a question for free or get affordable legal advice from our lawyer.