Posh Bananas Gifts

Information Security Policy

Table of Contents

Purpose. 5

Objectives. 6

Scope. 6

Compliance monitoring. 6

Review.. 7

Policy Statement 7

1.         Information security policies. 7

2.         Organisation of information security. 8

3.         Human resources security. 9

4.         Asset management 9

5.         Access control 10

6.         Cryptography. 11

7.         Physical and environmental security. 11

8.         Operations security. 12

9.         Communications security. 13

10.      System acquisition, development and maintenance. 13

11.       Supplier relationships. 14

12.      Information security incident management 15

13.      Information security aspects of business continuity management 15

14.      Compliance. 16

APPENDIX. 17

Purpose

Posh Bananas Gifts manages data under three main principles:

Confidentiality: Ensures that sensitive information such as customer data and business secrets is accessible only to authorise individuals to protect privacy and maintain trust. It involves implementing measures such as access controls, encryption and employee training to safeguard this information from unauthorised access or disclosure.

Integrity: Ensures that that data is accurate, complete, and protected against unauthorised alteration. This involves using controls such as access restrictions, file integrity monitoring and version management to prevent tampering and ensure that information remains trustworthy and reliable.

Availability: Ensures that information and systems are accessible to authorised users when needed, minimising downtime and disruptions. This involves implementing reliable hardware, backup solutions and disaster recovery plans to maintain continuous access to information.

Data we manage, in any form, faces potential risk and always requires adequate protection. Risks may result from errors, oversights, misunderstandings or malicious acts.  It is critical for all employees to understand their roles and responsibilities in safeguarding business information and assets.

A security incident can lead to brand damage, financial losses, compromised trading capabilities or even violations of regulations and laws, adversely affecting Posh Bananas
Gifts
Thus, it is the collective duty of all employees, contractors and vendors to strictly always comply with this policy and all related documents.

Along with the Information Security Policy there are two other critical documents that together aim to protect the business and the assets we manage.

These are:

Information Risk Policy

Data Protection Policy

Objectives

Posh Bananas Gifts’s security objectives are to ensure:

Scope

The Information Security Policy, along with its supporting controls, processes and procedures, is applicable to all information owned by or under the responsibility of Posh Bananas Gifts, regardless of the format in which the information is stored. This scope also extends to, and third party contracted to Posh Bananas Gifts.

The Information Security Policy and its supporting controls, processes and procedures apply to all individuals who have access to Posh Bananas Gifts information and technologies. This includes both employees and external parties that provide information processing services to Posh Bananas Gifts, ensuring comprehensive coverage and protection across all interactions with Posh Bananas Gifts information assets.

Compliance monitoring

Compliance with the established controls outlined in the Information Security Policy will be diligently monitored by the Information Security Team. This team is tasked with reporting their findings and compliance status directly to the designated <CONTROLLING BODY>, ensuring transparency and accountability in our security efforts.

The overarching responsibility for the information security of the Posh Bananas Gifts is allocated to the Owner. The Ownere oversees all aspects of information security, from policy implementation to compliance monitoring, ensuring that our security measures are robust and effective.

Review

To ensure that all policies remain current and fully aligned with evolving security requirements, a comprehensive review will be conducted at least annually. This review will be undertaken by the designated policy <MAINTAINER> who is/are responsible for assessing the policy’s effectiveness and alignment with the latest security practises and regulatory requirements. Subsequently, any modifications or updates proposed during the review must be formally approved by the policy <OWNER>, ensuring that changes are both necessary and beneficial for enhancing our information security framework.

Policy Statement

Posh Bananas Gifts is committed to managing our business based on three fundamental principles:

Confidentiality: Access to information is strictly limited to individuals who have a legitimate need to know. We ensure that information is always stored and transmitted securely to protect it from unauthorized access.

Integrity: We maintain the accuracy and reliability of the information we hold, ensuring it can always be trusted by our stakeholders.

Availability: Information is readily accessible to authorized users when needed. We have robust plans in place to address any incidents that may impact the availability of this information.

To uphold these principles, Posh Bananas Gifts will implement an Information Security Management System (ISMS) that adheres to internationally recognized standards. Our information security posture will be aligned with legislative requirements, contractual obligations, stakeholder expectations, customer needs, and best practices established by industry connections and governing bodies.

Adopting a risk-based approach, Posh Bananas Gifts will apply the following controls:

  1. Information security policies

Posh Bananas Gifts maintains a structured documentation system at 3 levels:

Policies: These documents articulate the aims, objectives and overarching approach of the company towards information security.

Procedures: These documents detail the specific steps required to complete tasks that support the company’s information security policy.

Standards: These documents provide detailed definitions, configurations, and guidelines that align with the aims of the information security policy and are referenced by the procedures.

A comprehensive set of lower-level policies, procedures and standards will be developed to support the high-level Information Security Policy and its objectives. This suite of supporting documentation will be formally approved by the designated <OWNER>, published, and communicated to all Posh Bananas Gifts employees, as well as relevant external parties.

  1. Organisation of information security

Posh Bananas Gifts commits to documenting, implementing, and maintaining a robust governance structure for information security management. This includes the clear assignment of security responsibilities to ensure the effective implementation, management, and operation of information security controls across the organization. It will document, implement and maintain appropriate governance for the management of information security. This will include assignation of identified security responsibilities to implement, manage and operate effective information security controls within Posh Bananas Gifts.

Governance and Roles:

Posh Bananas Gifts will appoint:

  1. Human resources security

Posh Bananas Gifts is committed to ensuring that all users are fully aware of their roles and responsibilities in maintaining information security. To achieve this, we will:

  1. Asset management

Posh Bananas Gifts ensures comprehensive documentation and accountability for all assets, including but not limited to:

Key points include:

  1. Access control

At Posh Bananas Gifts, access to assets and information strictly regulated to ensure security and compliance:

  1. Cryptography

Posh Bananas Gifts is committed to the secure effective use of cryptography to safeguard the confidentiality, authenticity, and integrity of our information and systems:

  1. Physical and environmental security

Posh Bananas Gifts ensures that all information processing facilities are securely housed and safeguarded against unauthorised access, damage, and interference through:

  1. Operations security

Posh Bananas Gifts ensures the security of its operations through comprehensive formal documentation and rigorous practices:

  1. Communications security

Posh Bananas Gifts is committed to ensuring the security of information and assets across all networks through rigorous network security controls:

  1.  System acquisition, development and maintenance

Posh Bananas Gifts enforces rigorous information security practices during the acquisition, deployment, maintenance, or replacement of systems, adhering to the following principles:

  1.  Supplier relationships

Posh Bananas Gifts implements effective due diligence checks and adheres to comprehensive information security policies and procedures when initiating and managing relationships with suppliers. This ensures that assets accessible to suppliers are adequately protected.

  1.  Information security incident management

Posh Bananas Gifts establishes clear definitions and protocols for identifying, reporting, and managing information security incidents:

  1.  Information security aspects of business continuity management

Posh Bananas Gifts implements comprehensive arrangements to protect and swiftly recover critical business operations in the event of any disruptions affecting information systems, regardless of their origin:

  1.  Compliance

Posh Bananas Gifts ensures that the design, operation, use, and management of information systems strictly comply with all relevant statutory, regulatory and contractual security requirements. To affirm our commitment to high security standards:

This variety ensures a thorough assessment of our security posture from multiple angles.

Review of this document: annually by <MAINTAINER>.

Next review date: 11th April 2026

APPENDIX.

Additional resources and guidelines.

Documents and guidance can be found here:

https://www.pcisecuritystandards.org/