Information Security Policy

Updated 27.01.2026

A document forming part of the Immercial IMS.

8. Information Security Policy

Document Name: Information Security Policy
Version: 1.0
Approved by: Directors, Immercial Limited
Review Frequency: Annual or upon material change


8.1 Purpose

This Information Security Policy defines Immercial Limited’s approach to protecting information assets and managing information security risks in alignment with ISO 27001 principles.

The policy is designed to be proportionate to the size, operational model, and risk profile of a specialist micro-company consultancy.


8.2 Policy Statement

Immercial Limited is committed to preserving the confidentiality, integrity, and availability of information assets that support our consultancy services, proprietary methodologies, digital tools, and client engagements.

Information security is embedded within Immercial’s Integrated Management System (IMS) and supports both operational resilience and client confidence.


8.3 Scope

This policy applies to:

  • All information assets owned, managed, or processed by Immercial

  • Digital platforms, systems, and cloud services

  • Intellectual property, benchmarks, templates, and methodologies

  • Client, commercial, and internal business information

  • Personnel and authorised users with access to Immercial systems

Public governance, data protection, and related policies published on the Immercial website form part of this policy framework by reference and are not duplicated internally.


8.4 Information Security Objectives

Immercial aims to:

  • Protect sensitive and confidential information from unauthorised access or disclosure

  • Ensure information remains accurate and reliable

  • Maintain availability of systems and data required for service delivery

  • Apply proportionate, risk-based security controls

  • Prevent, detect, and respond to information security incidents

  • Support continual improvement of security practices


8.5 Roles & Responsibilities

Senior management is responsible for:

  • Establishing and approving this policy

  • Ensuring appropriate security controls are in place

  • Reviewing information security risks and performance

All authorised users are responsible for:

  • Following documented security procedures

  • Protecting access credentials

  • Reporting suspected or actual security incidents


8.6 Key Security Principles

Information security controls are implemented based on:

  • Least privilege access

  • Role-based permissions

  • Secure configuration of devices and systems

  • Use of multi-factor authentication where supported

  • Regular review of access rights

  • Secure handling and storage of information


8.7 Incident Management

Information security incidents are identified, recorded, assessed, and addressed in accordance with the Information Security Incident Procedure. Lessons learned are used to improve controls where appropriate.


8.8 Business Continuity

Information security supports business continuity through:

  • Use of secure cloud-based systems

  • Regular data backup

  • Ability to operate remotely

  • Proportionate contingency arrangements


8.9 Review & Continual Improvement

This policy is reviewed at least annually as part of management review activities or sooner if significant changes to systems, services, or risks occur.

Immercial Limited