The confidentiality, integrity and availability of information are critical to the ongoing functioning and good governance of bigspark. Failure to adequately secure information increases the risk of financial and reputational losses from which it may be difficult for bigspark to recover.
This information security policy outlines bigspark’s approach to information security management. It provides the guiding principles and responsibilities necessary to safeguard the security of the company's information systems. Supporting policies, codes of practice, procedures and guidelines provide further details.
Bigspark Limited is committed to a robust implementation of Information Security Management. It aims to ensure the appropriate confidentiality, integrity and availability of its data. The principles defined in this policy will be applied to all the physical and electronic information assets for which bigspark Limited is responsible.
Bigspark Limited is specifically committed to preserving the confidentiality, integrity and availability of documentation and data supplied by, generated by and held on behalf of third parties pursuant to the carrying out of work agreed by contract in accordance with the requirements of data security standard ISO 27001.
The objectives of this policy are to:
This policy is applicable to, and will be communicated to, all staff and third parties who interact with information held by bigspark and the information systems used to store and process it.
This includes, but is not limited to: Cloud systems developed or commissioned by bigspark, any systems or data attached to the bigspark data or systems managed by bigspark, mobile devices used to hold bigspark data, data over which bigspark holds the intellectual property rights, data over which bigspark is the data controller or data processor, electronic communications sent from bigspark.
The following information security principles provide overarching governance for the security and management of information at bigspark.
All bigspark suppliers will abide by bigspark’s Information Security Policy, or otherwise be able to demonstrate corporate security policies providing equivalent assurance. This includes:
Under the GDPR, a breach of personal data can lead to a fine of up to 4% of global turnover. Where bigspark uses Cloud services, bigspark retains responsibility as the data controller for any data it puts into the service, and can consequently be fined for any data breach, even if this is the fault of the Cloud service provider. bigspark will also bear the responsibility for contacting Information Commissioner’s Office concerning the breach, as well as any affected individual. It will also be exposed to any lawsuits for damages as a result of the breach. It is extremely important, as a consequence, that bigspark is able to judge the appropriateness of a Cloud service provider’s information security provision. This leads to the following stipulations:
All employees of bigspark limited, agency staff working for bigspark, third parties and collaborators on bigspark projects will be users of bigspark information. This carries with it the responsibility to abide by this policy and its principles and relevant legislation, supporting policies, procedures and guidance. No individual should be able to access information to which they do not have a legitimate access right. Notwithstanding systems in place to prevent this, no individual should knowingly contravene this policy, nor allow others to do so. To report policy contraventions, please see Section 2.7: Incident Handling
Many members of bigspark will have specific or overarching responsibilities for preserving the confidentiality, integrity and availability of information. These include:
Responsible for the security of information produced, provided or held in the course of carrying out client or bigspark projects. This includes ensuring that data is appropriately stored, that the risks to data are appropriately understood and either mitigated or explicitly accepted, that the correct access rights have been put in place, with data only accessible to the right people, and ensuring there are appropriate backup, retention, disaster recovery and disposal mechanisms in place.
Responsible for the information systems (e.g. HR/ Registry/ Finance) both manual and electronic that support bigspark’s work. Responsibilities as above (for Project leads).
Responsible for specific area of bigspark's work, including all the supporting information and documentation that may include working documents/ contracts/ staff information.
Responsible for bigspark’s compliance with the General Data Protection regulation
Responsible for bigspark’s Data Protection Policy, data protection and records retention issues. Breach reporting to ICO
Responsible for approving information security policies.
Caldicott Guardian:
Defines offences in relation to the misuse of computers as:
“Defamation is a false accusation of an offence or a malicious misrepresentation of someone's words or actions. The defamation laws exist to protect a person or an organisation's reputation from harm.1”
The Terrorism Act 2006 makes it an offence to write, publish or circulate any material that could be seen by any one or more of the persons to whom it has or may become available, as a direct or indirect encouragement or other inducement to the commission, preparation or instigation of acts of terrorism. It also prohibits the writing, publication or circulation of information which is likely to be useful to any one or more persons in the commission or preparation of terrorist acts or is in a form or context in which it is likely to be understood by any one or more of those persons as being wholly or mainly for the purpose of being so useful. In addition, it prohibits the glorification of the commission or preparation (whether in the past, in the future or generally) of terrorist acts or such offences; and the suggestion that what is being glorified is being glorified as conduct that should be emulated in existing circumstances.
The GDPR has applied to the UK from 25 May 2018. The GDPR reinforces and extends data subjects’ rights as laid out in the Data Protection Act (1998), and provides additional stipulations around accountability and governance, breach notification and transfer of data. It also extends the maximum penalties liable due to a data breach, from £500,000 to 4% global turnover. The GDPR requires bigspark to maintain an Information Asset Register, to ensure where personal data is voluntarily gathered people are required to explicitly opt in, and can also easily opt out. It requires data breaches to be reported to the Information Commissioner’s Office within 72hrs of bigspark becoming aware of their existence.
© 2025 bigspark.ai All Rights Reserved.