Information Security Policy
How we protect our systems, data, and client information.
- Protect all information - client, employee, and company - from unauthorised access or disclosure
- Ensure information is accurate, complete, and available when required
- Maintain compliance with the UK GDPR, Data Protection Act 2018, and other applicable regulations
- Promote security awareness and accountability across all staff
- Prevent and respond effectively to information-security incidents
- On company-owned devices, systems, and cloud platforms
- Within third-party services or client systems managed by Ostratto
- By employees, contractors, consultants, and partners working on behalf of Ostratto
a) Unclassified - This is information that can be made public without any implications for the company, such as information that is already in the public domain
b) Employee confidential - This includes information such as medical records, pay and so on
c) Company confidential - Such as contracts, source code, business plans, passwords for critical IT systems, client contact records, accounts etc
d) Client confidential - This includes personally identifiable information such as name or address, passwords to client systems, client business plans, new product information, market sensitive information etc
- Access to systems is granted on a "least-privilege" basis
- All accounts must use strong, unique passwords and multi-factor authentication where available
- Shared credentials are prohibited
- Access rights are reviewed regularly and revoked when no longer required
- Systems are configured and maintained according to vendor and security best practices
- Software updates and patches are applied promptly
- Firewalls and endpoint protection are used on all networks and devices
- Cloud services must meet recognised security and compliance standards (e.g. ISO 27001, SOC 2)
- Office premises and IT equipment are protected by appropriate physical safeguards, including access control and secure storage
- Portable devices must be encrypted and never left unattended in unsecured areas
- All suspected or actual information-security incidents must be reported immediately to the Managing Director or IT Security Lead
- Incidents will be logged, investigated, and resolved following our incident-response procedure
- Where required, affected clients and the Information Commissioner’s Office (ICO) will be notified in accordance with legal requirements
- Data is backed up regularly and stored securely in encrypted form
- Backups are tested periodically to verify recoverability
- In the event of data loss or corruption, recovery will be prioritised based on business impact

