Cybersecurity Policy
- Purpose
This policy outlines the cybersecurity framework for Arc network to protect digital assets, maintain data integrity, and ensure business continuity in an evolving threat landscape. - Scope
This policy applies to all employees, contractors, vendors, and any individuals with access to Arc network systems, networks, and data. - Governance & Responsibility
- The group operations director is responsible for overseeing cybersecurity measures.
- Department heads must ensure compliance within their teams.
- All employees must adhere to security guidelines and report any suspicious activity.
- Access Control & Authentication
- Employees must use strong passwords and multi-factor authentication (MFA) for all systems.
- Access is granted based on the principle of least privilege.
- Regular access reviews will be conducted to ensure only authorized personnel have access to sensitive data.
- Data Protection & Privacy
- All company and customer data must be encrypted in transit and at rest.
- Employees must follow GDPR, California Consumer Privacy Act, and other relevant data protection regulations.
- Personal and sensitive data must only be stored on approved devices and platforms.
- Network Security
- Firewalls, intrusion detection systems (IDS), and anti-malware tools must be used to safeguard networks.
- All company devices must have up-to-date security patches and antivirus software.
- Incident Response & Reporting
- A formal incident response plan is in place to manage security breaches.
- Employees must report any suspected breaches or phishing attempts immediately.
- Security incidents will be logged, analysed, and remediated to prevent recurrence.
- Employee Training & Awareness
- Cybersecurity training is mandatory for all employees.
- Regular phishing simulations and awareness programs will be conducted.
- Employees must undergo refresher training at least annually.
- Third-Party & Vendor Management
- Vendors must comply with Arc network’s cybersecurity standards, detailed in this policy.
- Third-party access to company systems must be monitored and reviewed regularly.
- Contracts must include cybersecurity clauses and compliance requirements.
- Business Continuity & Disaster Recovery
- Regular data backups are conducted and securely stored.
- A disaster recovery plan is in place and tested annually.
- Systems have redundancy and failover mechanisms to ensure minimal downtime.
- Policy Compliance & Enforcement
- Non-compliance with this policy may result in disciplinary action.
- Regular audits and assessments will be conducted to ensure policy adherence.
- Employees are encouraged to provide feedback for continuous policy improvement.
- Review & Updates
- This policy will be reviewed annually and updated as necessary by the group operations director or deputy.
- Any major cybersecurity incidents will trigger an immediate review of the policy.