Information Security Policy


The purpose of this Policy is to safeguard information belonging to Good Innovation and its stakeholders (third parties, clients or customers and the general public), within a secure environment.

This Policy informs the Company’s staff, and other individuals entitled to use Company facilities, of the principles governing the holding, use and disposal of information.

It is the goal of Good Innovation that:

Information relates to:

The Policy

The Company requires all users to exercise a duty of care in relation to the operation and use of its information systems.

Authorised users of information system

With the exception of information published for public consumption, all users of Company information systems must be formally authorised by appointment as an employee, or as a consultant, or by other process specifically authorised by the Management Team. Authorised users will be in possession of a unique user identity. Any password associated with a user identity must not be disclosed to any other person.

Authorised users will pay due care and attention to protect Company information in their personal possession. Confidential, personal or private information must not be copied or transported without consideration of:

Acceptable use of information systems

Use of the Company’s information systems by authorised users will be lawful, honest and decent and shall have regard to the rights and sensitivities of other people.

Information System Owners

Employees who are responsible for information systems are required to ensure that:

Personal Information

Authorised users of information systems are not given rights of privacy in relation to their use of Company information systems. Duly authorised officers of the Company may access or monitor personal data contained in any Company information system (mailboxes, web access logs, file-store etc).


Individuals in breach of this policy are subject to disciplinary procedures at the instigation of the Manager/Director with responsibility for the relevant information system, including referral to the Police where appropriate.

The Company will take legal action to ensure that its information systems are not used by unauthorised persons.


The DPO has direct responsibility for maintaining this policy and providing guidance and advice on its implementation.

Information system owners are responsible for the implementation of this Policy within their area, and to ensure adherence.


This policy will be reviewed regularly.