{"id":2210,"date":"2024-12-10T20:37:44","date_gmt":"2024-12-10T20:37:44","guid":{"rendered":"https:\/\/liquidqube.com\/?page_id=2210"},"modified":"2025-02-19T05:18:07","modified_gmt":"2025-02-19T05:18:07","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/www.liquidqube.com\/it\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2210\" class=\"elementor elementor-2210\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c526a56 e-flex e-con-boxed e-con e-parent\" data-id=\"c526a56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a28291 e-flex e-con-boxed e-con e-parent\" data-id=\"6a28291\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d0ea12d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"d0ea12d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f24c45e animated-fast elementor-widget elementor-widget-heading\" data-id=\"f24c45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-732828a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"732828a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5743bba elementor-widget elementor-widget-text-editor\" data-id=\"5743bba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Introduction<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba3f853 elementor-widget elementor-widget-text-editor\" data-id=\"ba3f853\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At LiquidQube, protecting our information assets, customer data, and systems is a core priority. This Information Security Policy outlines our commitment to safeguarding the confidentiality, integrity, and availability of all information under our control. It provides a framework for managing information security risks and ensuring compliance with applicable laws, regulations, and industry standards.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b8faae elementor-widget elementor-widget-text-editor\" data-id=\"9b8faae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Scope<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91e1e76 elementor-widget elementor-widget-text-editor\" data-id=\"91e1e76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This policy applies to all employees, contractors, partners, suppliers, and stakeholders who interact with LiquidQube\u2019s information systems, data, and assets. It covers all forms of information, whether electronic, paper-based, or verbal, across all locations where LiquidQube operates.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90675c4 elementor-widget elementor-widget-text-editor\" data-id=\"90675c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Objectives<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af521f4 elementor-widget elementor-widget-text-editor\" data-id=\"af521f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Confidentiality:<\/strong> Protect sensitive information from unauthorised access and disclosure.<\/p><p><strong>Integrity:<\/strong> Ensure the accuracy, completeness, and reliability of information.<\/p><p><strong>Availability:<\/strong> Maintain reliable access to information and systems when required.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a13da95 elementor-widget elementor-widget-text-editor\" data-id=\"a13da95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Key Principles<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5255c6c elementor-widget elementor-widget-text-editor\" data-id=\"5255c6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Access Control:<\/strong><\/p><p>Implement the principle of least privilege, restricting access to information based on job roles and responsibilities.<\/p><p>Enforce strong authentication mechanisms, including multi-factor authentication (MFA).<\/p><p><strong>Data Classification and Handling:<\/strong><\/p><p>Classify information into sensitivity levels (e.g., public, confidential, restricted).<\/p><p>Ensure proper handling, storage, and disposal of sensitive data in line with classification requirements.<\/p><p><strong>Secure Communication:<\/strong><\/p><p>Encrypt sensitive data in transit and at rest.<\/p><p>Use secure communication channels for sharing and transmitting information.<\/p><p><strong>Physical Security:<\/strong><\/p><p>Restrict physical access to information systems and data storage areas.<\/p><p>Implement safeguards to protect against physical threats such as theft, damage, or unauthorised access.<\/p><p><strong>Incident Management:<\/strong><\/p><p>Establish a clear incident response plan for identifying, reporting, and mitigating security incidents.<\/p><p>Conduct root cause analyses and implement corrective actions to prevent recurrence.<\/p><p><strong>Third-Party and Supplier Security:<\/strong><\/p><p>Require all third parties and suppliers to adhere to LiquidQube\u2019s security standards.<\/p><p>Perform regular security assessments and due diligence on third-party providers.<\/p><p><strong>Training and Awareness:<\/strong><\/p><p>Provide ongoing security awareness training to employees and contractors.<\/p><p>Promote a culture of security by encouraging vigilance and best practices.<\/p><p><strong>Monitoring and Logging:<\/strong><\/p><p>Continuously monitor information systems for suspicious activities and potential threats.<\/p><p>Maintain logs of system activities to support forensic investigations and compliance requirements.<\/p><p><strong>Compliance:<\/strong><\/p><p>Ensure compliance with applicable legal, regulatory, and contractual requirements related to information security.<\/p><p>Regularly review and align security practices with recognised industry standards and frameworks.<\/p><p><strong>Data Backup and Recovery:<\/strong><\/p><p>Maintain regular, secure backups of critical information.<\/p><p>Test recovery procedures periodically to ensure data availability in case of incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-657a7f8 elementor-widget elementor-widget-text-editor\" data-id=\"657a7f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Roles and Responsibilities<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92320a1 elementor-widget elementor-widget-text-editor\" data-id=\"92320a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Leadership:<\/strong><\/p><p>Provide resources and support to maintain robust information security practices.<\/p><p>Promote a culture of accountability for information security across the organisation.<\/p><p><strong>Employees:<\/strong><\/p><p>Follow all information security policies, procedures, and guidelines.<\/p><p>Report security incidents or suspicious activities immediately to the IT Security Team.<\/p><p><strong>IT and Security Teams:<\/strong><\/p><p>Develop, implement, and maintain security controls and protocols.<\/p><p>Monitor and respond to security threats in a timely manner.<\/p><p><strong>Third Parties and Suppliers:<\/strong><\/p><p>Comply with LiquidQube\u2019s information security requirements.<\/p><p>Ensure security measures align with LiquidQube\u2019s standards when accessing or processing organisational information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c5a4db elementor-widget elementor-widget-text-editor\" data-id=\"2c5a4db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Policy Implementation<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6522ebb elementor-widget elementor-widget-text-editor\" data-id=\"6522ebb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Risk Assessments: <\/strong>Conduct regular risk assessments to identify and address vulnerabilities.<\/p><p>Develop and implement risk mitigation strategies.<\/p><p><strong>Audits and Reviews:\u00a0<\/strong>Perform periodic internal and external audits to evaluate the effectiveness of security measures.<\/p><p>Update policies and controls based on audit findings and emerging threats.<\/p><p><strong>Secure Development:\u00a0<\/strong>Incorporate security best practices into the design, development, and deployment of all software and systems.<\/p><p>Regularly test and validate the security of systems and applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5750863 elementor-widget elementor-widget-text-editor\" data-id=\"5750863\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Incident Reporting<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fd7ba5 elementor-widget elementor-widget-text-editor\" data-id=\"1fd7ba5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>All employees and stakeholders must report suspected or actual security incidents to <strong>compliance@liquidqubegroup.com<\/strong>\u00a0immediately. Examples of incidents include:<\/p><p>Unauthorised access to information or systems.<\/p><p>Data breaches or leaks.<\/p><p>Malware infections or phishing attempts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbdeb28 elementor-widget elementor-widget-text-editor\" data-id=\"bbdeb28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Policy Review<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9bd349 elementor-widget elementor-widget-text-editor\" data-id=\"a9bd349\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This Information Security Policy will be reviewed annually or as needed to address changes in the threat landscape, legal and regulatory requirements, or organisational needs. Updates will be communicated to all employees and relevant stakeholders.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f487f3 elementor-widget elementor-widget-text-editor\" data-id=\"8f487f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Contact Information<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4602e8c elementor-widget elementor-widget-text-editor\" data-id=\"4602e8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For any questions or concerns regarding this policy, please contact the Compliance Department at\u00a0<strong>compliance@liquidqubegroup.com<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Information Security Introduction At LiquidQube, protecting our information assets, customer data, and systems is a core priority. This Information Security Policy outlines our commitment to safeguarding the confidentiality, integrity, and availability of all information under our control. It provides a framework for managing information security risks and ensuring compliance with applicable laws, regulations, and industry [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-2210","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.liquidqube.com\/it\/wp-json\/wp\/v2\/pages\/2210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.liquidqube.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.liquidqube.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.liquidqube.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.liquidqube.com\/it\/wp-json\/wp\/v2\/comments?post=2210"}],"version-history":[{"count":0,"href":"https:\/\/www.liquidqube.com\/it\/wp-json\/wp\/v2\/pages\/2210\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.liquidqube.com\/it\/wp-json\/wp\/v2\/media?parent=2210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}