Expand | ||
---|---|---|
| ||
Does your organisation conduct an annual independent information security review and act upon the findings? Yes, our ISMS is audited annually both internally and externally. Along with other review mechanisms as part of our ISO 27001 requirements. More information: https://commonplace.atlassian.net/l/cp/f9aW1Qpj |
Expand | ||
---|---|---|
| ||
Do you have a formally documented information security management system (ISMS)? Yes, we operate a ISO 27001 certified information security management system. More information: https://commonplace.atlassian.net/l/cp/ArZfB1RN |
Expand | ||
---|---|---|
| ||
Does your organisation have an appointed person responsible for information security, such as a CISO? An Information Security Working Group meets monthly to review information security requirements and issues: More information: https://commonplace.atlassian.net/l/cp/u8vA3JXN |
Expand | |||
---|---|---|---|
| |||
Yes, here is the board approved Information Security Policy. |
Expand | ||
---|---|---|
| ||
Does your organisation have a formal policy on the use of mobile devices? Yes, you may request a copy of our Mobile & Teleworking Policy from customers@commonplace.is More information: https://commonplace.atlassian.net/l/cp/dWy3mBzn |
Expand | ||
---|---|---|
| ||
Does your organisation have a formal policy for remote working that includes security? Yes, you may request a copy of our Mobile & Teleworking Policy from customers@commonplace.is More information: https://commonplace.atlassian.net/l/cp/oVj6u2MH |
Expand | ||
---|---|---|
| ||
Does your organisation have a documented Acceptable Use Policy that outlines the rules for the acceptable use of company IT assets and information? Yes, our Asset Management Policy contains this information and is available on request from customers@commonplace.is In addition an Acceptable Use Policy for platform users is available https://www.commonplace.is/acceptable-use More information: https://commonplace.atlassian.net/l/cp/QB3eUX7P |
Expand | |||||
---|---|---|---|---|---|
| |||||
More information: https://commonplace.atlassian.net/l/cp/bY0m2XtM |
Expand | ||
---|---|---|
| ||
Does your organisation have a documented Access Control Policy? How are administrator accounts authorised and managed? Yes, you may request a copy of our Access Control Policy from customers@commonplace.is We conduct access reviews quarterly, biannually or annually depending on the system. More information: https://commonplace.atlassian.net/l/cp/FCfVRgLG |
Expand | ||
---|---|---|
| ||
Does your organisation have a Password Policy that is technically enforced throughout its IT estate? Yes, for both employees and users, in accordance with Cyber Essentials More information: https://commonplace.atlassian.net/l/cp/4ALmsaj0 |
Expand | |||||
---|---|---|---|---|---|
| Yes, this is documented in our Operating Procedures for Information and Communication Technology, which is available on request from customers@commonplace.is|||||
More information: https://commonplace.atlassian.net/l/cp/1BfZH75h |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/wy0EzmZN |
Expand | ||
---|---|---|
| ||
Does your organisation prevent the use of removable media, and is this enforced technically? Yes, enforced via mobile device management software. More information: https://commonplace.atlassian.net/l/cp/R2dg1YSW |
Expand | ||
---|---|---|
| ||
Are your organisation's information security policies accessible to all employees? Yes, available via our intranet. More information: https://commonplace.atlassian.net/l/cp/ucnpB1zM |
Expand | ||
---|---|---|
| ||
Are your organisation's information security policies reviewed and approved by senior management at least annually? Yes. More information: https://commonplace.atlassian.net/l/cp/4XK3av1E |
Expand | |||||
---|---|---|---|---|---|
| |||||
More information: https://commonplace.atlassian.net/l/cp/Y71ES0yG |
Expand | |||
---|---|---|---|
| |||
Yes, Jira tickets require a security risk level More information: https://commonplace.atlassian.net/l/cp/GrfPb1z6 |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/StpXL2W4 |
Expand | |||
---|---|---|---|
| |||
Yes. Our ISMS is audited annually both internally and externally. along with other review mechanisms as part of our ISO27001 requirements. More information: https://commonplace.atlassian.net/l/cp/3HgecJNc |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/1z05F0ZZ |
Expand | |||||
---|---|---|---|---|---|
| Yes.|||||
More information: https://commonplace.atlassian.net/l/cp/DoyF2o8A |
Expand | ||||
---|---|---|---|---|
| ||||
More information: |
Expand | ||
---|---|---|
| ||
Does your organisation have a defined process that is followed when a client contract is terminated that includes the secure destruction of client data? Yes. Two years after the license ends at the latest, each project is archived and the responses are pseudonomised. More information: https://commonplace.atlassian.net/l/cp/LZ4JWYHP |
Expand | ||
---|---|---|
| ||
Does your organisation use threat intelligence to inform decisions about information security? Yes. We are subscribed to a number of newsletters from our vendors and other sources (inc UK NCSC) to maintain an overview of the security landscape across our application and network. All risks are logged in our risk register More information: https://commonplace.atlassian.net/l/cp/1de1J7Ys |