Expand | ||
---|---|---|
| ||
Does your organisation conduct an annual independent information security review and act upon the findings? Yes, our ISMS is audited annually both internally and externally. Along with other review mechanisms as part of our ISO 27001 requirements. More information: https://commonplace.atlassian.net/l/cp/f9aW1Qpj |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/ArZfB1RN |
Expand | ||
---|---|---|
| ||
Does your organisation have an appointed person responsible for information security, such as a CISO? An Information Security Working Group meets monthly to review information security requirements and issues: More information: https://commonplace.atlassian.net/l/cp/u8vA3JXN |
Expand | ||
---|---|---|
| ||
Does your organisation have a documented Cybersecurity Policy or Information Security Policy? Yes, here is the board approved Information Security Policy. |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/dWy3mBzn |
Expand | ||
---|---|---|
| ||
Does your organisation have a formal policy for remote working that includes security? Yes, you may request a copy of our Mobile & Teleworking Policy from customers@commonplace.is More information: https://commonplace.atlassian.net/l/cp/oVj6u2MH |
Expand | |||||
---|---|---|---|---|---|
| Yes, our Asset Management Policy contains this information and is available on request from customers@commonplace.is|||||
In addition an Acceptable Use Policy for platform users is available https://www.commonplace.is/acceptable-useMore information: https://commonplace.atlassian.net/l/cp/QB3eUX7P |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/bY0m2XtM |
Expand | |||||
---|---|---|---|---|---|
| Yes, you may request a copy of our Access Control Policy from customers@commonplace.is|||||
We conduct access reviews quarterly, biannually or annually depending on the system. More information: https://commonplace.atlassian.net/l/cp/FCfVRgLG |
Expand | |||
---|---|---|---|
| |||
Yes, for both employees and users, in accordance with Cyber Essentials More information: https://commonplace.atlassian.net/l/cp/4ALmsaj0 |
Expand | ||
---|---|---|
| ||
Does your organisation have a documented Backup Policy? Yes, this is documented in our Operating Procedures for Information and Communication Technology, which is available on request from customers@commonplace.is More information: https://commonplace.atlassian.net/l/cp/1BfZH75h |
Expand | ||
---|---|---|
| ||
Does your organisation enforce a Clear Desk and Screen Policy? Yes, you may request a copy of our Clear Screen & Desk Policy from customers@commonplace.is More information: https://commonplace.atlassian.net/l/cp/wy0EzmZN |
Expand | ||
---|---|---|
| ||
Does your organisation prevent the use of removable media, and is this enforced technically? Yes, enforced via mobile device management software. More information: https://commonplace.atlassian.net/l/cp/R2dg1YSW |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/ucnpB1zM |
Expand | |||
---|---|---|---|
| |||
Yes. More information: https://commonplace.atlassian.net/l/cp/4XK3av1E |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/Y71ES0yG |
Expand | ||||
---|---|---|---|---|
| ||||
More information: https://commonplace.atlassian.net/l/cp/GrfPb1z6 |
Expand | |||
---|---|---|---|
| |||
Yes. Employees are granted access only to systems and resources required to complete their job functions. Administrative or other elevated permissions are strictly controlled and only granted when absolutely required. Generally, this is privileged access is only granted to those in more senior roles. eg. admin access to Commonplace platform infrastructure is only granted to the CPTO, Head of Technology and Tech Leads. All access is recorded and reviewed on a regular basis (frequency is dependent on the criticality and sensitivity of the system and data) to ensure access remains in line with the restricted approach. More information: https://commonplace.atlassian.net/l/cp/StpXL2W4 |
Expand | |||
---|---|---|---|
| |||
Yes. Our ISMS is audited annually both internally and externally. along with other review mechanisms as part of our ISO27001 requirements. More information: https://commonplace.atlassian.net/l/cp/3HgecJNc |
Expand | |||
---|---|---|---|
| |||
Yes, as part of ISMS we have a fully documented risk assessment and treatment process, which is reviewed regularly and at least annually. We maintain an organisation-wide risk register for IT and data security issues. More information: https://commonplace.atlassian.net/l/cp/1z05F0ZZ |
Expand | ||
---|---|---|
| ||
Does your organisation have a formal confidentiality or non disclosure agreement in place for all staff, contractors and third parties? |
Expand | ||
---|---|---|
| ||
Does your organisation segregate duties to prevent unauthorised disclosure or access to information? Employees are granted access only to systems and resources required to complete their job functions. Administrative or other elevated permissions are strictly controlled and only granted when absolutely required. Generally, this is privileged access is only granted to those in more senior roles. eg. admin access to Commonplace platform infrastructure is only granted to the CPTO, Head of Technology and Tech Leads. All access is recorded and reviewed on a regular basis (frequency is dependent on the criticality and sensitivity of the system and data) to ensure access remains in line with the restricted approach. Only customer users with an admin login to Commonplace have access to any personal information about respondents: Email addresses are not available in the current dashboard. |
Expand | ||
---|---|---|
| ||
Does your organisation have a defined process that is followed when a client contract is terminated that includes the secure destruction of client data? Yes. Two years after the license ends at the latest, each project is archived and the responses are pseudonomised.https://commonplace.atlassian.net/l/cp/LZ4JWYHP |
Expand | ||
---|---|---|
| ||
Does your organisation use threat intelligence to inform decisions about information security? Yes. We are subscribed to a number of newsletters from our vendors and other sources (inc UK NCSC) to maintain an overview of the security landscape across our application and network. All risks are logged in our risk registerhttps://commonplace.atlassian.net/l/cp/1de1J7Ys |