Guides

Information Security Policy

The Information Security Policy of Pushologies details how we exercise due care and due diligence to protect Information from unauthorised access, use, disclosure, destruction, modification, disruption or distribution.

By doing this we will ensure that our reputation with our clients is maintained. We manage all information under the Key Principles of confidentiality, integrity and availability.

Our Management team will ensure business, legal, regulatory requirements, e.g., GDPR and contractual security obligations are taken into account throughout our operations.

Risk Identification and Assessments is at the core our approach and this is continually undertaken against agreed criteria.

The Management Team bears the responsibility for establishing and maintaining the Information Security Management System and this policy. We undertake to ensure its integrity is maintained through instruction and training of our personnel and that each employee has a proper understanding of what is required of them.

Equally, every employee has a personal responsibility to maintain this integrity.

Through our approach to Supplier Management, we will ensure any subcontractor employed for a particular function will meet the requirements specified and accept responsibility for their actions.

We encourage and promote Continuous Improvement throughout our operations and use Objective setting in line with the ISO 27001:2013 Standard requirements.

The Information Security Management System is monitored regularly under the Senior Management’s ultimate responsibility with regular reporting of the status and effectiveness at all levels.