Data protection

Clinco maintain a robust information security management system (ISMS) which meets the requirements of ISO 27001:2013

We are committed to providing a professional and ethical service to our clients. Our ISMS objectives are set out in our Business Management System Manual, as follows:

  • Clinco will deliver its services within a secure environment
  • Clinco will maintain the confidentiality, integrity and availability of information and data
  • Clinco will comply with all legal requirements and codes of practice related to information security
  • Clinco will evaluate the performance and effectiveness of the ISMS and promote continual improvement
  • Clinco will promote organisational responsibility, accountability, awareness, knowledge and skill
  • Clinco will promote and share best practice relating to information security within the industry

 

pb170140-done

Clinco’s information security management system incorporates:

Physical security

  • Services are performed in-house, in a secure facility which benefits from an onsite team of SIA licensed security officers, who are present 24 hours a day, 365 days a year
  • Premises are protected by CCTV cameras, intruder detection systems and site fire systems
  • Secure, onsite DX Exchange point and mail room

IT Security

  • Clinco are configured with their own secure Vlan
  • A site firewall is in place
  • Industry appropriate anti-viral software is installed on all company pcs, which are password protected
  • Data is backed-up and is stored securely and locally and cannot be accessed remotely
  • Data transfer is via a CESG CPA and PGA certified encryption platform

Documents, policies and procedures

  • All business processes and procedures are fully documented
  • A comprehensive Business Management System Manual, incorporating the ISMS is in place
  • Confidentiality agreements are in place for employees, company visitors and IT solution providers

 

crusher

Further details on our information security management system are available on request

Please see also our Privacy Policy,  Legal Disclaimer and policy on Information Security Management