Date: 1 Mar 2017
1. General requirements
Selectamark holds third party certification to BS EN ISO 9001:2000 and is registered with the Information Commissioner's Office in accordance with the requirements of the Data Protection Act 1998.
2. Information security management system
Selectamark has established and maintains a documented information security management system.Risk assessments
Selectamark has identified an appropriate risk assessment methodology and developed criteria for reviewing and identifying acceptable levels of risk and measures to control risk.Information security management system documentation
Selectamark has established and maintains documentation supporting the management of the secure asset register in accordance with LPS1224 and BS EN ISO 9001:2000.Document control
Selectamark controls documents required by the information security management system in accordance with a defined set of procedures that comply with the requirements of clause 4.2.3 of BS EN ISO 9001:2000Record maintenance
Selectamark maintains records in accordance with procedures that comply with the requirements of clause 4.2.4 of BS EN ISO 9001:2000Management responsibility
Selectamark's management is commited to running an effective information security management system which includes defining roles and responsibilities, providing adequate resources, ensuring regular internal audits are carried out and conducting reviews of the system at least once every year.Resource management
Selectamark shall ensure there is sufficient resources to a) operate the secure asset register in accordance with the reuqirements of LPS1224 and b) maintain the service levels stated in accordance with clause 3.2.16
Selectamark logs operations and events to support detection of potential breaches in information security.
Selectamark has established and maintains a system for identifying, reporting, investigating and responding to a) unauthorised activity b) security incidents and c) faults.
Selectamark has defined and implemented procedures for conducting internal audits, recording the results of audits and maintaining records of the audits.Corrective and preventative actions
Selectamark has defined and implemented document procedures for implementing corrective actions to eliminate the cause of existing or previous non-conformities.Maintenance
Selectamark makes regular and frequent back-ups of all information, and these are encrypted to prevent unauthorised use. Back-up copies are stored at multiple secure locations and tested regularly.
Selectamark has implemented a business continuity procedure to ensure that a) it can operate the secure asset register within 24 hours of a major event/incident that affects the provision of the secure asset registration service occuring and b) minor events/incidents do not undermine its conformity with the service level defined in accordance with clause 126.96.36.199. The continuity plan is tested and reviewed on a regular basis.
Selectamark's service level is set out here.
Personnel are made aware of the relevance and importance of information security activities. Prior to being given access to the secure asset register, all staff are subjected to security vetting in accordance with BS 7858:2006 Security screening of individuals employed in a security environment - Code of practice. Only authorised personnel have access to information held on the secure asset register.
All employees and contractors which have access to the secure information have signed confidentiality agreements.Outsources services
Outsourced services are managed in accordance with the requirements of this standard and ISO 9001:2000
Access to secure information held electronically is restricted to personnel with appropriate access privileges, in accordance with clause 188.8.131.52.
4. Access to secure informationInformation exchange policy
Selectamark has implemented a policy for exchange of secure information. This covers third parties:
- registering assets on the secure asset register
- searching for assets on the secure asset register
- reporting assets as lost or stolen
- reporting assets as found
- transferring ownership or otherwise updating ownership information