← Back to Policies

Information Security Policy

Protecting Personal Data Through Enterprise-Grade Security

Policy Information

Policy Owner: Chief Technology Officer & Data Protection Officer

Effective Date: [INSERT DATE]

Review Date: [ANNUAL REVIEW]

Version: 1.0

Applies To: All Staff, Contractors, Systems & Data

1. Introduction and Purpose

This Information Security Policy establishes ClearMinds' framework for protecting the confidentiality, integrity, and availability of information and information systems.

As a provider of mental health services processing sensitive personal data, information security is critical to:

📋 Security Certification Roadmap

Current Status: ClearMinds' security practices are designed to align with industry-standard frameworks including ISO 27001, Cyber Essentials Plus, and SOC 2 Type II principles. We are actively pursuing formal certifications as part of our enterprise partnership expansion:

  • Cyber Essentials Plus: Target Q2 2025 (government-backed baseline security certification)
  • Annual Penetration Testing: Scheduled Q2 2025 (independent security assessment)
  • ISO 27001 ISMS Certification: Target 2026 (international information security management standard)
  • SOC 2 Type II: Under evaluation for US enterprise client requirements

Current Platform Security: 70,000+ active B2C subscribers processed securely; platform infrastructure designed for enterprise-grade security and scalability.

Our Security Commitment

We are committed to implementing and maintaining enterprise-grade security controls that protect personal data and information systems to the highest professional standards.

2. Scope

This policy applies to:

3. Information Security Principles

3.1 Confidentiality

Information is protected from unauthorized disclosure. Only authorized individuals can access information appropriate to their role.

3.2 Integrity

Information is accurate, complete, and protected from unauthorized modification. Changes are properly authorized and logged.

3.3 Availability

Information and systems are available when needed by authorized users. We maintain appropriate backup and recovery procedures.

4. Roles and Responsibilities

Role Security Responsibilities
Board of Directors Ultimate accountability for information security, approve policy, ensure adequate resources
Chief Technology Officer Policy owner, oversee security strategy, manage IT security team, report to board
Data Protection Officer Ensure security meets GDPR requirements, advise on security measures, investigate breaches
IT Security Team Implement security controls, monitor threats, respond to incidents, conduct assessments
All Managers Ensure team compliance, manage access rights, report security incidents
All Staff Follow security procedures, protect passwords, report incidents, complete training

5. Access Control

5.1 User Access Management

Principle: Least privilege - users only have access to information and systems necessary for their role.

Access Control Procedures:

5.2 User Responsibilities

5.3 Password Requirements

5.4 Multi-Factor Authentication (MFA)

MFA is mandatory for:

6. Physical and Environmental Security

6.1 Secure Areas

6.2 Equipment Security

6.3 Clear Desk Policy

7. Communications and Operations Security

7.1 Network Security

7.2 Malware Protection

7.3 Backup and Recovery

7.4 Patch Management

8. Cryptography

8.1 Encryption Standards

8.2 Key Management

9. System Development and Maintenance

9.1 Secure Development

9.2 Security Testing

10. Supplier Relationships

10.1 Third-Party Security

All suppliers and service providers must:

10.2 Cloud Service Providers

Additional requirements for cloud providers:

11. Information Security Incident Management

11.1 Incident Categories

11.2 Reporting Procedures

All security incidents must be reported immediately:

11.3 Response Procedures

For every incident:

⚠️ Data Breach Response: Suspected data breaches must be reported to the DPO immediately. We have 72 hours to report serious breaches to the ICO. See our Data Breach Response Plan for detailed procedures.

12. Business Continuity

12.1 Business Continuity Plan

12.2 Disaster Recovery

13. Compliance and Assurance

13.1 Security Audits

13.2 Security Certifications

ClearMinds maintains or is working towards:

13.3 Compliance Requirements

14. Training and Awareness

14.1 Mandatory Training

All staff must complete:

14.2 Training Topics

15. Acceptable Use

15.1 System Use Policy

Company systems must only be used for:

15.2 Prohibited Activities

15.3 Email and Internet Use

15.4 Mobile Devices

16. Remote Working Security

16.1 Remote Access Requirements

16.2 Home Working Best Practices

17. Data Disposal and Destruction

17.1 Electronic Data

17.2 Physical Documents

18. Monitoring and Logging

18.1 System Monitoring

18.2 Audit Logging

18.3 Staff Monitoring

Staff should be aware that:

19. Policy Review and Updates

This policy is reviewed:

20. Enforcement

Violations of this policy may result in:

Questions or Concerns?

IT Security Team: it-security@clearmindseap.com

Data Protection Officer: dpo@clearmindseap.com

Emergency (24/7): [EMERGENCY NUMBER]