Policies
INFORMATION SECURITY AND DATA PROTECTION POLICY
Review Date: 30th December 2025
Review Intervals: 6 months or as required
Approved by: Luke McFarland
- Purpose
This Information Security and Data Protection Policy establishes a framework to ensure the confidentiality, integrity, and availability of organizational data in compliance with:
- ISO/IEC 27001:2022 (Information Security Management)
- General Data Protection Regulation (GDPR) (EU)
- California Consumer Privacy Act (CCPA) (US)
- Australian Privacy Principles (APPs) & Privacy Act 1988
- Other applicable global data protection laws
- Scope
This policy applies to:
- All employees, contractors, and third-party vendors handling company data.
- All IT systems, networks, and physical storage containing sensitive data.
- All data processing activities, including collection, storage, transfer, and disposal.
- Information Security Principles
3.1 Confidentiality
- Access to sensitive data is restricted based on role-based access control (RBAC).
- Encryption (AES-256, TLS 1.2+) is used for data at rest and in transit.
3.2 Integrity
- Data modifications are logged and audited.
- Checksums and digital signatures verify data authenticity.
3.3 Availability
- Business continuity (BCP) and disaster recovery (DRP) plans are in place.
- Systems are monitored for uptime and performance.
- Data Protection & Privacy Compliance
4.1 GDPR Compliance
- Lawful Basis for Processing: Consent, contract, legal obligation, or legitimate interest.
- Data Subject Rights: Right to access, rectify, erase, and portability.
- Data Protection Officer (DPO): Appointed where required.
- Breach Notification: Reported to authorities within 72 hours if high risk.
4.2 CCPA Compliance
- Consumer Rights: Right to know, delete, and opt-out of data sales.
- "Do Not Sell My Personal Information" link on the website.
4.3 Australian Privacy Act (APPs)
- Data Minimization: Only collect necessary personal data.
- Cross-border Data Transfers: Ensure equivalent protection.
4.4 Global Data Protection Laws
- Data Localization: Comply with jurisdictional requirements (e.g., China’s PIPL, Brazil’s LGPD).
- Third-Party Vendors: Must sign Data Processing Agreements (DPAs).
- Access Control & Authentication
- Multi-Factor Authentication (MFA) for critical systems.
- Principle of Least Privilege (PoLP) enforced.
- Regular Access Reviews conducted quarterly.
- Incident Response & Breach Management
- Incident Response Plan (IRP) aligned with ISO 27035.
- Forensic Investigation for breaches.
- Regulatory & Customer Notifications as required by law.
- Employee Training & Awareness
- Annual security training covering phishing, social engineering, and data handling.
- Secure coding practices for developers.
- Third-Party Risk Management
- Vendor Security Assessments before engagement.
- Contractual clauses for data protection compliance.
- Policy Enforcement & Review
- Non-compliance may result in disciplinary action.
- Annual review to align with evolving regulations.
- Contact
For questions, contact:
- Data Protection Officer (DPO):
DPO@McFarland-Consulting.com

Follow Us On Social Media...
© 2025Luke McFarland Consulting| All rights reserved.