{"id":4577,"date":"2019-10-17T10:45:50","date_gmt":"2019-10-17T09:45:50","guid":{"rendered":"http:\/\/teamkinetic.co.uk\/blog\/?p=4577"},"modified":"2019-11-08T19:34:25","modified_gmt":"2019-11-08T19:34:25","slug":"it-and-information-governance-faqs","status":"publish","type":"post","link":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/","title":{"rendered":"IT and Information Governance FAQs"},"content":{"rendered":"\n<h3><span style=\"font-weight: 400;\">Have security-related job responsibilities, including oversight and accountability, been clearly defined and documented? <\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Yes, all jobs have detailed JD in place with attention to Information Governance and responsibility.\u00a0 Chris Martin is currently accountable for Information Governance.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Are policies for information handling and labelling in place? <\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Yes.\u00a0 TeamKinetic have policies for Information Governance, Continuity, Security, Personnel, Safeguarding, Data sharing and API use.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Are all third-parties vetted prior to being granted privileged access to data?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">3<\/span><span style=\"font-weight: 400;\">rd<\/span><span style=\"font-weight: 400;\"> party contractors do not have access to live data.\u00a0 All data in encrypted at rest and in transit.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Do you maintain an inventory of all important information assets with asset owners clearly identified? <\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Yes, information assets are held in applications that are directly owned by customers.\u00a0 <\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Describe the screening process for all users, employees, contractors, vendors, and other third-parties)?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Access to data is limited to the operational team.\u00a0 These staff have all undergone IG training, DBS check and are part of the senior team here at TeamKinetic.\u00a0 No other employees, contractors, vendors or other 3<\/span><span style=\"font-weight: 400;\">rd<\/span><span style=\"font-weight: 400;\"> parties have access to user data.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Describe your hiring process and how a new employee is granted access to network resources and when these access rights are reviewed.<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">All prospective candidates are interview by a single team member and by then by a panel of at least 3 current employees.\u00a0 All new starters are inducted and undergo a basic information governance session with Chris. Only staff with a specific requirement will ever be granted direct access to user data.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Do you conduct formal information security awareness training for all users, including upper management?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Yes, all staff undergo basic information governance training.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Describe the physical security mechanisms that prevent unauthorized access to your office space, user workstations, and server rooms\/data centres?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">All TeamKinetic sites enjoy the following physical security provision.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Security perimeter\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Proximity ID (smartcards) for Access control<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Receptionist<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">CCTV cameras<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Fire \/ Flood protection<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cables and network ports are protected from unauthorised access<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">On-site redundancy and engineering support<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Controls are in place to secure access to networked services, This is available via a documented process.\u00a0 Access to provision user accounts is reviewed at least annually.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remote secure network access is granted using VPN with no Dual\u2013homing \/ split tunnelling. Appropriate encryption methodologies are employed, documented, reconciled and monitored to AES 256 standard.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">All systems in our internal and externally\u2013facing and DMZ environments secured<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Do you employ automatic locking screen savers when users\u2019 workstations remain idle after set period of time?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">All workstations are locked after a period of inactivity and require a password on resume.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How is the removal of equipment from the premises authorized and controlled?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">All storage equipment is first comprehensively formatted and then physically destroyed before being removed.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How do you protect your systems against newly-discovered vulnerabilities and threats?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Our servers that control and serve TeamKinetic are patched with all zero day vulnerabilities and security patches as they are released<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How do you prevent end users from installing potentially malicious software (e.g., list of approved applications, locking down the desktop)? <\/span><\/h3>\n<p><span style=\"font-weight: 400;\">All workstations are operated under a lowest security clearance possible. Without administrator access it is not possible to install software on workstations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Centralised virus and malware software is used to check workstations and isolate suspect items if necessary.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Do you scan traffic coming into your network for viruses?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Our email servers scan all incoming messages for viruses and quarantined accordingly<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How do you dispose of computer media when they are no longer of use and are logs kept of media disposal activity?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">All storage capable equipment is comprehensively formatted and then physically destroyed before being disposed of.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Describe how you protect information media (e.g., back-up tapes) that is shipped offsite. <\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Media and backups that are stored off site are protected by RSA encryption<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Please describe your Access Control Policy. <\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Our access control policy is based on a minimal access level at all times.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Any users or systems that require access to our resources are first required to submit an access proposal explaining what access they require and why.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If successful the access request is then passed to our chief technical officer who will be responsible for setting up the minimal security level possible for successful access and the revocation of that access after the agreed time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Any requests for access are logged. The revocation of access is checked by one other technical officer once the access date has lapsed to ensure access is not maintained.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Describe the process by which non-employee (e.g., contractor, vendor, and customer) is granted access to network resources and how often these are reviewed. <\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Only authorised systems engineers are allowed physical access to our remote servers. This access is logged via security card.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No third parties have standing access to the OS of our servers. Any access that has to be granted is provided via lowest possible security level users that are strictly time limited.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Any such permissions are revoked once access has been completed.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">To what extent are user\u2019s system use logged and monitored?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Full system logs of bother server and database access are stored for two weeks.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Is an information security incident log maintained? <\/span><\/h3>\n<p>Yes<\/p>\n<h3><span style=\"font-weight: 400;\">Are incident reports issued to appropriate management? <\/span><\/h3>\n<p>Yes<\/p>\n<h3><span style=\"font-weight: 400;\">Are audit logs or other reporting mechanisms in place on all platforms? <\/span><\/h3>\n<p>Yes<\/p>\n<h3><span style=\"font-weight: 400;\">Are internal and external audits performed on regular basis? <\/span><\/h3>\n<p>Yes<\/p>\n<h3><span style=\"font-weight: 400;\">Do you have documented business continuity plan? <\/span><\/h3>\n<p>Yes<\/p>\n<h3><span style=\"font-weight: 400;\">Do you have documented disaster recovery policy? <\/span><\/h3>\n<p>Yes<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[292],"tags":[],"class_list":["post-4577","post","type-post","status-publish","format-standard","hentry","category-securitygdpr"],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>IT and Information Governance FAQs - TeamKinetic<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"IT and Information Governance FAQs - TeamKinetic\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/\" \/>\r\n<meta property=\"og:site_name\" content=\"TeamKinetic\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TeamKineticUK\" \/>\r\n<meta property=\"article:published_time\" content=\"2019-10-17T09:45:50+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2019-11-08T19:34:25+00:00\" \/>\r\n<meta name=\"author\" content=\"Rolf Herbert\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@TeamKineticUK\" \/>\r\n<meta name=\"twitter:site\" content=\"@TeamKineticUK\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rolf Herbert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/\"},\"author\":{\"name\":\"Rolf Herbert\",\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/person\/bf564ec6a7b141b3fd5b42b422977775\"},\"headline\":\"IT and Information Governance FAQs\",\"datePublished\":\"2019-10-17T09:45:50+00:00\",\"dateModified\":\"2019-11-08T19:34:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/\"},\"wordCount\":908,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#organization\"},\"articleSection\":[\"Security and GDPR\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/\",\"url\":\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/\",\"name\":\"IT and Information Governance FAQs - TeamKinetic\",\"isPartOf\":{\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#website\"},\"datePublished\":\"2019-10-17T09:45:50+00:00\",\"dateModified\":\"2019-11-08T19:34:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/teamkinetic.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT and Information Governance FAQs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#website\",\"url\":\"https:\/\/teamkinetic.co.uk\/blog\/\",\"name\":\"TeamKinetic\",\"description\":\"Connect, with great value volunteer management software\",\"publisher\":{\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/teamkinetic.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#organization\",\"name\":\"TeamKinetic\",\"url\":\"https:\/\/teamkinetic.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2023\/06\/logo-TeamK.png\",\"contentUrl\":\"https:\/\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2023\/06\/logo-TeamK.png\",\"width\":1850,\"height\":498,\"caption\":\"TeamKinetic\"},\"image\":{\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TeamKineticUK\",\"https:\/\/twitter.com\/TeamKineticUK\",\"https:\/\/www.instagram.com\/teamkineticuk\/\",\"https:\/\/www.linkedin.com\/company\/teamkinetic\/\",\"https:\/\/www.youtube.com\/c\/TeamKinetic\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/person\/bf564ec6a7b141b3fd5b42b422977775\",\"name\":\"Rolf Herbert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c2bcd1f933804170bd2b84b2048457a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c2bcd1f933804170bd2b84b2048457a8?s=96&d=mm&r=g\",\"caption\":\"Rolf Herbert\"},\"url\":\"https:\/\/teamkinetic.co.uk\/blog\/author\/rolf-herbert\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT and Information Governance FAQs - TeamKinetic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/","og_locale":"en_GB","og_type":"article","og_title":"IT and Information Governance FAQs - TeamKinetic","og_url":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/","og_site_name":"TeamKinetic","article_publisher":"https:\/\/www.facebook.com\/TeamKineticUK","article_published_time":"2019-10-17T09:45:50+00:00","article_modified_time":"2019-11-08T19:34:25+00:00","author":"Rolf Herbert","twitter_card":"summary_large_image","twitter_creator":"@TeamKineticUK","twitter_site":"@TeamKineticUK","twitter_misc":{"Written by":"Rolf Herbert","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/#article","isPartOf":{"@id":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/"},"author":{"name":"Rolf Herbert","@id":"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/person\/bf564ec6a7b141b3fd5b42b422977775"},"headline":"IT and Information Governance FAQs","datePublished":"2019-10-17T09:45:50+00:00","dateModified":"2019-11-08T19:34:25+00:00","mainEntityOfPage":{"@id":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/"},"wordCount":908,"commentCount":0,"publisher":{"@id":"https:\/\/teamkinetic.co.uk\/blog\/#organization"},"articleSection":["Security and GDPR"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/","url":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/","name":"IT and Information Governance FAQs - TeamKinetic","isPartOf":{"@id":"https:\/\/teamkinetic.co.uk\/blog\/#website"},"datePublished":"2019-10-17T09:45:50+00:00","dateModified":"2019-11-08T19:34:25+00:00","breadcrumb":{"@id":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/it-and-information-governance-faqs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/teamkinetic.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"IT and Information Governance FAQs"}]},{"@type":"WebSite","@id":"https:\/\/teamkinetic.co.uk\/blog\/#website","url":"https:\/\/teamkinetic.co.uk\/blog\/","name":"TeamKinetic","description":"Connect, with great value volunteer management software","publisher":{"@id":"https:\/\/teamkinetic.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/teamkinetic.co.uk\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/teamkinetic.co.uk\/blog\/#organization","name":"TeamKinetic","url":"https:\/\/teamkinetic.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2023\/06\/logo-TeamK.png","contentUrl":"https:\/\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2023\/06\/logo-TeamK.png","width":1850,"height":498,"caption":"TeamKinetic"},"image":{"@id":"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TeamKineticUK","https:\/\/twitter.com\/TeamKineticUK","https:\/\/www.instagram.com\/teamkineticuk\/","https:\/\/www.linkedin.com\/company\/teamkinetic\/","https:\/\/www.youtube.com\/c\/TeamKinetic"]},{"@type":"Person","@id":"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/person\/bf564ec6a7b141b3fd5b42b422977775","name":"Rolf Herbert","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/teamkinetic.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c2bcd1f933804170bd2b84b2048457a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c2bcd1f933804170bd2b84b2048457a8?s=96&d=mm&r=g","caption":"Rolf Herbert"},"url":"https:\/\/teamkinetic.co.uk\/blog\/author\/rolf-herbert\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8AVXm-1bP","jetpack-related-posts":[{"id":3167,"url":"https:\/\/teamkinetic.co.uk\/blog\/2019\/06\/teamkinetic-information-governance\/","url_meta":{"origin":4577,"position":0},"title":"TeamKinetic, Information Governance","author":"Rolf Herbert","date":"20th June 2019","format":false,"excerpt":"Date last updated \u2013 20th June 2019 This post provides a summary of TeamKinetic's information governance policy. Full copies of all documents that make up our security policy are available on request. We utilise the Information Governance Toolkit to continually assess our adherence to governance standards and requirements. Scope The\u2026","rel":"","context":"In &quot;Policy and Operations&quot;","block_context":{"text":"Policy and Operations","link":"https:\/\/teamkinetic.co.uk\/blog\/category\/policy-and-operations\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":16876,"url":"https:\/\/teamkinetic.co.uk\/blog\/2025\/09\/iso-27001-certification\/","url_meta":{"origin":4577,"position":1},"title":"TeamKinetic: Setting the Standard for the Sector with ISO 27001 Certification","author":"Alex Evans","date":"12th September 2025","format":false,"excerpt":"Achieving ISO 27001 certification is a significant undertaking. For us at TeamKinetic, it was a worthwhile investment that underscores our deep commitment to data security and governance. This certification is not just a badge; it's a testament to our ongoing efforts to protect our clients' information and to set the\u2026","rel":"","context":"In &quot;News &amp; Views&quot;","block_context":{"text":"News &amp; Views","link":"https:\/\/teamkinetic.co.uk\/blog\/category\/news-views\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2025\/09\/ISO27001.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2025\/09\/ISO27001.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2025\/09\/ISO27001.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2025\/09\/ISO27001.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2025\/09\/ISO27001.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1764,"url":"https:\/\/teamkinetic.co.uk\/blog\/2018\/04\/are-you-ready-for-gdpr\/","url_meta":{"origin":4577,"position":2},"title":"Are you ready for GDPR?","author":"Chris Martin","date":"23rd April 2018","format":false,"excerpt":"A whitepaper to help you get ready for GDPR and find out what it means for your data. Whitepaper - Are you ready for GDPR\u00a0- Download the paper here. What should you be doing now? If you haven\u2019t started preparing your organisation for compliance then the next 3 months are\u2026","rel":"","context":"In &quot;Application Features and Tutorials&quot;","block_context":{"text":"Application Features and Tutorials","link":"https:\/\/teamkinetic.co.uk\/blog\/category\/application-features-and-tutorials\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2018\/04\/GDPR-why-now-info--300x296.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1822,"url":"https:\/\/teamkinetic.co.uk\/blog\/2018\/05\/gdpr-frequently-asked-questions-for-teamkinetic\/","url_meta":{"origin":4577,"position":3},"title":"GDPR Frequently Asked Questions for TeamKinetic","author":"Rolf Herbert","date":"18th May 2018","format":false,"excerpt":"This document will continue to develop over time as we respond to more questions from our customer and users.\u00a0 Please feel free to subscribe to stay up to date. 1. Do we need to get renewed consent from every volunteer and provider? We will be asking all volunteers and providers\u2026","rel":"","context":"In &quot;Policy and Operations&quot;","block_context":{"text":"Policy and Operations","link":"https:\/\/teamkinetic.co.uk\/blog\/category\/policy-and-operations\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4575,"url":"https:\/\/teamkinetic.co.uk\/blog\/2019\/10\/contingency-and-continuity-planning\/","url_meta":{"origin":4577,"position":4},"title":"Contingency and Continuity Planning","author":"Rolf Herbert","date":"17th October 2019","format":false,"excerpt":"Contingency and continuity planning policy \u00a0 Identified Potential Risks The following identified risks will trigger a potential contingency event, each event is independently risk assessed and will be managed in accordance with this policy. Natural disaster Fire Flood Sudden cessation of trade Sale of company Hardware failure Software failure Malicious\u2026","rel":"","context":"In &quot;Security and GDPR&quot;","block_context":{"text":"Security and GDPR","link":"https:\/\/teamkinetic.co.uk\/blog\/category\/securitygdpr\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1525,"url":"https:\/\/teamkinetic.co.uk\/blog\/2018\/01\/teamkinetic-new-eula-and-data-policy\/","url_meta":{"origin":4577,"position":5},"title":"TeamKinetic: New EULA and Data Policy","author":"Chris Martin","date":"29th January 2018","format":false,"excerpt":"On Friday 26th January 2018 our new EULA and Data Policy was enacted. Since 2016, organisations have been preparing for the reformation of data protection in the form of GDPR (General Data Protection Regulation). For many organisations operating within the third sector, a certain apprehension has loomed, driven by concerns\u2026","rel":"","context":"In &quot;News &amp; Views&quot;","block_context":{"text":"News &amp; Views","link":"https:\/\/teamkinetic.co.uk\/blog\/category\/news-views\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2024\/02\/blog-image-36.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2024\/02\/blog-image-36.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/teamkinetic.co.uk\/blog\/wp-content\/uploads\/2024\/02\/blog-image-36.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4577"}],"version-history":[{"count":2,"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4577\/revisions"}],"predecessor-version":[{"id":4579,"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4577\/revisions\/4579"}],"wp:attachment":[{"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teamkinetic.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}