Our Information Security
Public
Anyone can see it
Internal
Just for staff
Confidential
Named staff members only
Commercial in confidence
Client-related data that we’d prefer wasn’t shared. Things like pricing and proposals.
Client Confidential
The biggie. Client data that comes from engagements. This is always encrypted at rest, never transferred over public networks without encryption and once an engagement finishes, the data is checked into an archive that is encrypted using the public key from a specially protected key pair.
Third Party Security
Like most businesses these days, we make use of a number of third party platforms to help us run our business including Accounting, CRM and web hosting. Each of these is assessed in line with our ISMS due diligence procedures and is only used to store information related to either our company or our clients once it has passed.
Our Applications
Like most businesses these days, we make use of a number of third party platforms to help us run our business including Accounting, CRM and web hosting. Each of these is assessed in line with our ISMS due diligence procedures and is only used to store information related to either our company or our clients once it has passed.