TeamViewer Remote Support

logo
Click the above TeamViewer logo to download the support client. Run the file and follow the support agent instructions.
info@sharkit.co.uk
+44 1462 487078

Information Security Policy

This is the overarching policy which explains the key ways that Shark IT ensures the secure handling of its information while providing appropriate access.

It applies to everyone – all staff, associates, and anyone else authorised to use Shark IT facilities and information.

1. Policy

1.1 It is the policy of Shark IT that the information it manages will be appropriately secured to protect against the consequences of personal data breaches, breaches of confidentiality, failures of integrity, or interruptions to the availability of that information.

1.2 Shark IT will aim to achieve a culture in which legal requirements and information security risks are considered whenever information is handled, through the provision of training, awareness campaigns and specialist guidance and advice.

1.3 Shark IT will implement information security management practices which apply appropriate security while at the same time enabling staff, students and visitors to access and use the information they need.

1.4 Shark IT will collect, store and process information in accordance with applicable privacy and information laws.

1.5 Information held in user accounts may be examined on behalf of Shark IT by authorised persons for specific operational or legal reasons.

2. Scope

2.1 This policy is binding on all those who use Shark IT information such as staff, contractors, consultants, visitors and guests of Shark IT whether accessing information from on or off-site.

3. Oversight

3.1 Overall responsibility for information security in Shark IT is delegated from the Director. The Director has the authority to define and implement Shark IT-wide information security policies.

3.2 The Director is responsible for approval of information security policy and for overseeing policy implementation.

3.3 The Directorr, is responsible for regular policy reviews and monitors the effectiveness of the information security policy across Shark IT. It also commissions and responds to independent audits of information security arrangements.

4. Responsibilities

4.1 All information users are responsible for protecting and ensuring the security of the information to which they have access.

4.2 Shark IT staff are responsible for ensuring that all information in their area is managed in conformance with this policy.

4.3 Staff, contractors, consultants, visitors and guests who act in breach of this policy, or who do not act to implement it, may be subject to disciplinary procedures.

4.4 Any breach of information security or violation of this policy must be reported to the Director of Information who will take appropriate action and inform the relevant authorities.

01 January 2022 Approved by Director of Information, G Peddie

Review

Review cycle: Three yearly

Date of next review: January 2025