Information Security Notice

Last updated 1st June 2024

1. The purpose of this notice is to inform & assure those performing Information Security, Data Privacy, Risk Management, Compliance or Procurement due diligence for the use of PageTiger service.

2. Pagetiger Limited hold the following Information Security certifications:

We also participate in the UK Government National Cyber Security Centre CiSP Cyber Security information sharing partnership.

Please visit these sites for further reading:

3. Pagetiger Limited are compliant with the UK Information Commissioner ICO data protection register (Data Controller registration number ZA113062).

4. Our Information Security policy is available on request to clients, prospect clients, suppliers or legitimate 3rd parties providing the following contents:

  • Information Security policy statement
  • Executive summary
  • ISMS scope
  • ISMS objectives
  • Information Security Policy Management (A5)
  • Organisation of Information Security (A6)
  • Human Resource Security (A7)
  • Asset Management (A8)
  • Access Control (A9)
  • Cryptography (A10)
  • Physical & Environment (A11)
  • Operations Security (A12)
  • Communications Security (A13)
  • System Acquisition & Development (A14)
  • Supplier Relationships (A15)
  • Information Security Incident Management (A16)
  • Information Security & Business Continuity Management (A17)
  • Compliance (A18)
  • Continual Improvement
  • Policy distribution, training & monitoring
  • Confidentiality
  • Policy exceptions
Further guidance & related documents:
  • Information security Certifications
  • Change History
  • Appendices
5. Our Information Security Management System ISMS is aligned to these Information Security objectives:
  • Preserve the operations & continuity of the business;
  • Maintain an operational risk management framework;
  • Maintain legal, regulatory & contractual compliance;
  • Maintain profitability & cash-flow;
  • Maintain commercial image & brand reputation;
  • The ISMS is subject to continuous review & improvement.

6. The following policies support our ISMS:

  • Access Control
  • Access Control matrix
  • Acceptable Use
  • Asset Management
  • Backup
  • Business Continuity Planning
  • Change Management
  • Clear Desk and Clear Screen
  • Continual Improvement
  • Cookies
  • Cryptographic Control and Encryption
  • Cryptographic Key Management
  • Data Breach
  • Data Protection
  • Data Retention
  • Disaster Recovery
  • Disposal and Destruction
  • Document & Record
  • Ethics
  • Expenses
  • Finance
  • Homeworking
  • HR
  • Information Classification & Handling
  • Incident Management
  • Information Governance
  • Information Security
  • Information Security Awareness & Training
  • Information Transfer
  • Intellectual Property Rights
  • ISMS Manual of Guidance
  • Logging & Monitoring
  • Maintenance and review
  • Malware
  • Mobile and Teleworking
  • Network Security Management
  • Password Management
  • Patching
  • Privacy Notice (Client)
  • Privacy Notice (Employee)
  • Physical and Environment
  • Risk Management
  • Sales Operations
  • Secure Development
  • Secure System Engineering Principles
  • Significant Incident and Collection of Evidence
  • Supplier Management
  • Testing
  • Vulnerability Management

7. PageTiger policies, procedures, processes, reports and diagrams are confidential and cannot be externally disclosed with the exception of our Information Security policy and those relating to Ethics, Privacy and Cookies.

8. Approved logos for use by PageTiger.

Cyber Essentials
CiSP
FSQS
ISO

One tool for all your metrics