Information Security & Acceptable Use Policy
1. Document Goal
The purpose of this document is to outline the acceptable and unacceptable use of information and IT assets provided or managed by Tempo. The acceptable use rules are in place to protect Tempo, its employees, partners and customers from various information security risks like virus attacks, compromise of IT assets & services, unauthorised disclosure or theft of personal and business sensitive information potentially leading to legal & regulatory non-compliance, reputational damage, operational disruption and/or financial loss. These best practices also provide valuable guidance to the users in protecting their personal digital identity online, which remains users’ responsibility.
Tempo has designated a senior level information security official as Data Protection Officer (hereafter referred to as the DPO) responsible for direction and oversight of the security program. The DPO’s intentions for publishing an Information Security Policy are not to impose restrictions that are contrary to Tempo’s established culture of openness, trust and integrity. The DPO is committed to protecting Tempo’s employees and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.
Internet/Intranet/Extranet-related systems, including, but not limited to computer equipment, mobile devices, software, operating systems, storage media, network accounts providing electronic mail, WWW browsing and Cloud computing, that are provided by Tempo are the property of Tempo. These systems are to be used for business purposes in serving the interests of the company, and of our clients and customers in the course of normal operations.
Effective security is a team effort involving the participation and support of every Tempo employee and affiliates who deal with information and/or IT assets. It is the responsibility of every Employee, consultant, contractor and other third-party who use Tempo information and IT assets to know the requirements stated in this policy, and to conduct their activities accordingly.
Tempo management is committed to continuously invest and improve ISMS controls and efforts with appropriate human, technical and procedural support, as well as ensure that all required elements are met in order to establish, implement, maintain and continually improve the ISMS.
1.1 Scope of the document
This document applies to all Employees, consultants, contractors and other third-parties who use Tempo information and IT assets (hereafter referred to as IT Users).
1.2 Audience and roles
● Managing directors are responsible for approving the Policy.
● The DPO is responsible for creating, reviewing, and updating the Policy.
● Implementation responsibilities are defined in each segment respectively.
● All employees are responsible for reading, acknowledging and practicing requirements in this Policy segment.
1.3 System Owners
● System owners are responsible for a specific system used to support Tempo business goals, by ensuring the system is functioning properly and is used for intended business purpose, access to the system is strictly regulated, reviewed and access granted based on least-privilege and need-to-know principles.
● System owner role is assigned by the DPO to an individual most familiar with the system they have been assigned for and with relevant experience and training to manage the system in question.
● System Owners are responsible to assist the DPO in the quarterly User Access review process.
1.4 Definitions, terms and abbreviations
“Business Sensitive Information” means Tempo information which is classified as “Internal” or “Confidential” will be considered as business sensitive information. It includes anything that poses a risk to the company if discovered by a competitor or general public. Such information includes trade secrets, acquisition plans, financial data and supplier and customer information, among other possibilities. For the purpose of this document, Sensitive Personally Identifiable Information (PII) and Protected Health Information (PHI) are also included.
“IT User” refers to any person authorised to access the IT tools, resources of Tempo (and those of its entities) and to make use of them: Employees(staff), contractors, temporary personnel, service provider personnel, etc.
“IT Asset” refers to any information, system or hardware that is used in the course of business activities. It can be a device such as a notebook, smartphone, network equipment, conferencing equipment and an information system such as an information or communication technology used by Tempo or authorised third party to provide a service i.e. AWS cloud hosting platform, third party applications, internally developed systems. This refers to company-owned assets, acquired third party assets and personal assets that are subject to BYOD policy in this document.
2. General Information Security Policy
Protect Tempo’s informational and IT assets (including but not limited to all computers, mobile devices, networking equipment, software and sensitive data) against all internal, external, deliberate or accidental threats and to mitigate the risks associated with the theft, loss, misuse, damage or abuse of these systems;
Ensure information will be protected against any unauthorised access. Users shall only have access to resources that they have been specifically authorised to access. The allocation of privileges shall be strictly controlled and reviewed regularly.
Protect CONFIDENTIALITY of information. When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorised parties;
Ensure INTEGRITY of information. Integrity of information refers to protecting information from being modified by unauthorised parties;
Maintain AVAILABILITY of information for business processes. Availability of information refers to ensuring that authorised parties can access the information when needed.
Comply with and, wherever possible, exceed, national legislative and regulatory requirements, standards and best practices;
Develop, Maintain and Test business continuity plans to ensure we stay on course despite all obstacles that we may come across. It is about “keeping calm and carrying on!”;
Raise awareness of information security by making information security training available for all Employees. Security awareness and targeted training shall be conducted consistently, security responsibilities reflected in job descriptions, and compliance with security requirements shall be expected and accepted as a part of our culture;
Ensure that no action will be taken against any employee who discloses an information security concern through reporting or in direct contact with the DPO, unless such disclosure indicates, beyond any reasonable doubt, an illegal act, gross negligence, or a repetitive deliberate or willful disregard for regulations or procedures;
Report all actual or suspected information security breaches to dpo@tempoaudits.com
2.1 Enforcement, Exceptions and Complaints
Non-conformance to policy and standard statements in this Policy could result in disciplinary action including, but not limited to, informal or formal warnings, up to termination of contract. Any exceptions to what is governed will require written authorisation by email from Information Security Management Leader. Exceptions granted will be issued a policy waiver for a defined period of time. All target users of this Policy can submit complaints to its contents to Information Security Management Leader at any point. All complaints will be filed and processed accordingly where Information Security Management Leader will respond within 14 days of initial submission. Requests for exceptions to this policy as well as complaint submissions will be addressed to Tempo’s Data Protection Officer, Rob Hall, at dpo@tempoaudits.com.
3. Acceptable Use of Tempo IT Assets
3.1 Roles in scope
● Our Data Protection Officer is responsible for Implementation of this Policy segment in Tempo.
● All IT Users are obliged to read, acknowledge and comply with the rules defined in this segment.
3.2 Basic rules
Tempo’s Business Sensitive Information (see Table of definitions) and IT assets remain the sole property of Tempo. Every IT User shares a responsibility to protect it from unauthorised disclosure, loss, modification, tampering and/or destruction. This is applicable for personal devices approved to be used for business purposes.
IT Users are accountable for the actions performed using their access credentials provided by the company to access Tempo Business Sensitive Information and IT assets. All access requests shall be approved by the IT Users supervisor and managed by the DPO.
Only reviewed and approved software shall be used for business purposes, reviewed and approved by the DPO based on internal privacy and security requirements and applicable regulations. Full list of approved software is appended in Appendix A - List of approved software. Any requirement for new software shall be directed to the DPO for formal review and approval.
Tempo Business Sensitive Information and IT assets must be used primarily for business purposes and in accordance with the principles of need-to-know and need-to-have and least privilege.
Limited personal usage of IT assets (like email, Internet, etc.) is permitted if such use is occasional, of reasonable duration, does not adversely affect the business and performance, does not violate security policies of Tempo, local and International laws, and is not otherwise prohibited by applicable legislations and regulations.
All persons who have been given temporary or permanent Tempo access control tokens/cards/keys should keep them on their persons at all times while staying in Tempo premises. Giving the access control token/card/key to another person is strictly prohibited. If an access control token/card/key is lost or stolen, the IT User shall be under the obligation to immediately report the incident to the DPO at dpo@tempoaudits.com. If an access control token/card/key is forgotten, a temporary access control token/card/key will be provided at the reception desk or by the DPO. The temporary access control token/card/key is valid one day, and shall be returned at the end of working hours.
For security and maintenance purposes only, authorised personnel within Tempo and/or its authorised third-parties may audit and monitor equipment, systems and network traffic.
IT Users shall not tamper with any operational controls or attempt to prove any weakness in the systems without adequate authorisation. Malicious hackers, snoopers, password stealers, virus installers, data erasers, and anyone involved in such activity will be subject to disciplinary actions.
IT Users are responsible to promptly report any suspicious or malicious events, theft, loss, or unauthorised access/disclosure of Business Sensitive Information and IT assets to dpo@tempoaudits.com.
Special attention shall be paid so that contents which include, but are not limited to, pornographic, insulting, racist or other contents of discriminatory character are not allowed to be downloaded, distributed, visited, used or browsed using Tempo’s IT assets. Unauthorised use and copying of copyright-protected materials, including, but not limited to digitalisation and distribution of photos from magazines, books or other sources protected by copyrights of music, films and other multimedia contents protected by copyrights and installation of software for which Tempo doesn’t have a valid licence, shall be strictly prohibited.
The unauthorised use or attempt to use Tempo IT assets shall not be allowed. This includes unauthorised access, processing and/or distribution of Business Sensitive Information.
Disclosing one's own access parameters (e.g. username, password, PIN code) to other personnel shall not be permitted without written approval from the DPO. Unauthorised use or attempts to use other IT users’ access parameters shall be strictly prohibited. Access parameters are created per companies Acceptable and Unacceptable Use of User Accounts and Passwords segment in this document. Exceptions to these two rules can only be distributed in written form by the DPO.
Every violation of and/or deviation from the rules provided herein, failure to observe them and/or abuse of rights and authority hereunder granted to IT users shall constitute a violation of work duty and, therefore, may lead to disciplinary action up to termination of contract.
3.3 Compliance with Legal Obligations
IT users are subject to specific obligations, based on applicable external and internal requirements, to protect Tempo IT assets and reputation of Tempo. IT Users are required to comply with applicable legal and regulatory provisions in this area, including those that penalise contraventions of accepted moral standards, the diffusion of defamatory or racist statements, piracy or computer fraud, non-compliance with copyright, or other similar examples of inappropriate behaviour.
Violations will be investigated by Tempo’s DPO. Employees who report violations or suspected violations will be protected from retaliation.
Users authorised by Tempo must comply with local and national laws and regulations that govern the use, exportation and importation of Personally Identifiable Information (PII) and Protected Health Information (PHI).
Employees agree to cooperate with federal or state investigations or disciplinary proceedings.
NOTICE: All users are aware and agree that certain actions performed on company assets and networks are monitored and logged strictly for security purposes and only actions that are directly identified as a violation of policy or a direct threat in a form of malicious code or cyber attack attempt are observed. Access to these logs is restricted only to roles in charge of security at Tempo. For more information contact the DPO at dpo@tempoaudits.com.
3.4 Acceptable and Unacceptable use of Email Services and instant messaging
Acceptable Use:
Use of Tempo email addresses in public websites, forums and/or blogs is allowed for business purposes only.
Always ensure emails are sent to intended recipients only. Remove unwanted attachments or information from the email trails when forwarding or responding to email messages.
Validate the received emails for following before taking any action:
Verify that the received emails are from trustworthy sources; i.e. verify that they are sent from a known email address by checking the source email address.
If an unexpected email is received from a trustworthy address and/or contains any unexpected attachments and/or links, then validate the email by checking verbally with the sender before opening the email or clicking on any attachment or link.
Report suspicious or untrustworthy emails to dpo@tempoaudits.com by means of forwarding the original email and permanently delete such emails from your inbox.
Use only approved instant messaging services for business use.
Unacceptable Use:
Open/click the attachment and/or hyperlink in suspicious or untrustworthy emails.
Send emails to distribution lists without a business need.
Use of public/private email services (like Gmail, Yahoo, Hotmail, etc.) to exchange Business Sensitive Information.
The following are some examples of activities that are prohibited and may result in disciplinary action:
Automatic forwarding of Tempo emails to non-business related email addresses.
Unauthorised use, or forging, of email header information and email signatures.
Originating, forwarding or distributing chain letters, offensive, junk, or unsolicited email.
Transmit messages or images that may be construed as harassing, offensive or threatening to others.
Usage of profanity, obscenities, or derogatory remarks in any of the email messages discussing business related matters.
Sending documents, software, videos and/or audio files that violate copyright laws.
Making fraudulent offers of products, items, or services using any Tempo account.
3.5 Acceptable and Unacceptable Use of Internet Services
Acceptable Use:
Access to the Internet is neither anonymous or confidential; any action undertaken is identifiable as having originated within Tempo.
IT Users may consult websites that are directly connected to and necessary for their activities. However, occasional and reasonable use, for personal reasons, of websites with respect to which the content is not contrary to the law and/or accepted moral standards and does not pose a risk to the image and reputation of the company, will be permitted if it does not hinder the accomplishment of the employees’ tasks nor the security of the IT network of Tempo.
Connection to the Internet from company-provided devices shall be made via Tempo network, equipped with suitable security controls to prevent and/or detect malicious/inappropriate websites and content. Where this is not possible, IT Users shall take reasonable steps to protect themselves as well as Tempo by accessing protected networks.
Usage of social media and internet services for private purposes is allowed on company devices only in a way that it does not obstruct regular business duties and is performed with the same security awareness and behaviour as with company internet services. Company social media accounts are managed by dedicated team members and should never be used without proper authorisation.
Use of Internet services shall be performed prudently and in context of assigned job responsibilities.
Use of Internet-based peer-to-peer file sharing services like BitTorrent, uTorrent etc. is prohibited.
Use of public storage services like OneDrive, DropBox, BOX for transferring and/or storing Tempo Business Sensitive Information is not permitted. IT Users shall only use approved storage mediums for transferring and/or storing Tempo Business Sensitive Information. Users shall seek advice from the DPO (by contacting at dpo@tempoaudits.com) where there is a legitimate business need to use such services. Full list of approved software is appended in Appendix A - List of approved software.
Unacceptable Use:
Disclose Business Sensitive Information on Internet-based or publicly accessible services like newsgroups, social media, blogging sites, forums, etc.
Post text or messages on Internet sites that may be construed as harassing, offensive or threatening to others.
Bypass Tempo security controls to gain access to websites, which are otherwise blocked.
Downloading copyrighted or intellectual property materials, software programs, audio, video, data files, etc. violating any copyright restrictions.
Visit Internet sites that contain obscene, hateful or other objectionable materials.
Use of security circumvented devices to access corporate WiFi (jailbreak, root, etc.) is strictly prohibited. Use of any smartphones not approved by the DPO to access corporate WiFi is strictly prohibited.
Note: Where there is a requirement to disclose Tempo information in public forums or services for business purposes, IT Users shall abide by requirements defined in Section – Acceptable and Unacceptable Use of Use of Business Sensitive Information below*.*
3.6 Acceptable and Unacceptable Use of Business Sensitive Information
Acceptable Use:
Classify data whenever it is created, received, or modified into appropriate classification levels in accordance with P-14 Document and Record Control.
Authorisation for access to Tempo Business Sensitive Information is subject to approval from the IT User’s line management and must be formally renewed in the event of a change of position or a transfer.
Tempo’s Business Sensitive Information must be stored only in systems that are provided and/or approved by Tempo
IT Users shall share Business Sensitive Information with other users based on need-to-know principle and request access revocation when the need is no longer there.
Special care shall be given to transfer of PII data - No more than 50 records shall be transmitted via collaboration platform messaging system internally to a single recipient; No PII data shall be transmitted via email outside of the TempoOS; Transfer of PII data outside of TempoOS shall be done with specific approval and in accordance with the contractual clauses and regulatory requirements meeting specific security technical requirements during the transfer. Contact the DPO for support on this matter.
Before destroying or retaining company data, users must consult the DPO at dpo@tempoaudits.com.
IT Users shall protect Business Sensitive Information in the form of hard copies against theft and unauthorised access by ensuring the following:
Business Sensitive Information in the form of hardcopies must be adequately protected and placed in locked and secure cabinets, when not in use.
Personally attend and collect the printouts immediately from the printers.
Never leave copies of printouts containing Business Sensitive Information unattended in meeting rooms, desks, etc.
All unwanted paper copies of sensitive information must be disposed off securely using a paper shredder.
Unacceptable Use:
Exchanging or storing Business Sensitive Information on third-party systems or locations that are not reviewed and approved by the DPO. Full list of approved software is appended in Appendix A - List of approved software.
Business Sensitive Information is left unattended or available for unauthorised individuals to access, including on desks, printers, copiers, fax machines, and computer monitors
Using official business cloud storage and/or other authorised file storage and sharing systems for storing personal files related to photos, music, videos, personal documents, etc.
Using business sensitive information for personal purposes and personal gain.
Following are some actions that users avoid with regard to Business Sensitive Information:
Record ‘confidential’ information type on answering machines/voice mail systems or ‘out of office’ messages.
Disclose Business Sensitive Information without validating the identity of the recipients.
Leave Business Sensitive Information at the workplace unattended.
3.7 Acceptable and Unacceptable Use of User Accounts and Passwords
Acceptable Use:
Necessary precautions shall be taken to protect your user accounts and passwords, provided to access the systems and network from unauthorised access/misuse.
All account credentials (Passwords, PINs, etc.) shall be stored in the company approved password management system.
All account credentials that fulfil sharing requirements (test accounts, temporary passwords) shall be shared only using the company approved password management system.
Use complex passwords to access Tempo IT assets. Following guidelines shall be applied while selecting a strong password:
All user-level passwords shall have at least 10 characters.
All system-level passwords shall have at least 12 characters.
All passwords shall contain characters from at least three of the following four groups:
Uppercase letters of English alphabet
Lowercase letters of English alphabet
Numerical characters
Special characters.
All passwords shall not be formed by repeating simple patterns or by using simple sequences of characters (by repeating characters or using monotonically increasing or decreasing array of numbers).
All passwords shall not be composed of well-known or easily accessible personal information.
All passwords used for Tempo’s IT assets shall not be used anywhere else.
PIN code shall have at least 6 numerical characters.
PIN code shall not be created using simple patterns or predictable sequences of numbers (by repeating or using monotonically increasing or decreasing array of numbers).
All passwords and PINs shall be rotated at least annually.
IT Users must immediately change their passwords if:
It is the first-time use;
Password has been reset by system administrator;
They know or suspect that their password has been obtained or used by others.
Any disclosure or compromise of passwords must be reported to the DPO at dpo@tempoaudits.com.
Unacceptable Use:
Share Tempo provided user account and password with others inside or outside Tempo without prior approval from the DPO.
Reuse the same password across multiple systems. Use passwords that are used for personal purposes in systems like personal emails, social networks, etc. on Tempo systems.
Store their passwords in any computer file, emails, and mobile phones or on paper unless electronically encrypted or physically secured.
3.8 Acceptable and Unacceptable Use of Company Workstations – Desktops and Laptops
Acceptable Use:
Use workstations primarily for business purposes.
Every workstation shall have an up-to date antivirus software (or be a device with inbuilt antivirus) provided and managed by Tempo and configured according to baseline security requirements defined and maintained by the DPO.
Every workstation operating system and installed software shall be kept up-to-date and regularly patched.
Immediately log-off or disconnect from workstations in conference rooms or meeting rooms after meetings.
Never leave desktops/laptops unattended for an extended period unless it has been properly safeguarded with controls like screen lock.
Only approved software (Appendix A - List of approved software) or DPO-approved software is allowed to be installed on company workstations. All software shall be from approved sources.
In the event where desktop/laptop equipment are required to be sent to IT workshops for repairing purpose, the IT User of the device shall contact the DPO for guidance on securing the data on the device prior to sending.
Physically secure your laptops when not in use.
Company laptops must always be carried in person and not be checked in as baggage while travelling.
Unacceptable Use:
Use of mobile phones for storing business sensitive information. Mobile phones do not guarantee data protection by company security controls.
Connect removable storage media, external hard drives or USB devices to company provided desktop and/or laptops.
Disabling or tampering with implemented security features such as Corporate Antivirus, Email security, Local firewall, Wireless access points etc.
Using Tempo provided computing assets to engage in activities that are in violation of corporate policies and applicable local or internal laws and regulations.
Dispose laptop and/or desktop equipment outside of the established process for equipment disposal. Users can contact the DPO at dpo@tempoaudits.com for the required guidance.
Connect laptops to untrusted networks, like free and public Wi-Fi Hotspots without the use of company provided VPN. Home WiFi networks are considered safe if protected with a strong passphrase and at least WPA2 security protocol. It is highly recommended that VPN be used in all cases except when connected directly to the corporate WIFI network in the office.
Downloading and/or installing unapproved software applications onto Tempo workstations is prohibited. If you require a software or a tool that is not listed in the Approved Software List appended in Appendix B, please contact the DPO at dpo@tempoaudits.com for requested software evaluation.
3.9 Acceptable and Unacceptable Use of Teleworking
Teleworking means that information and communication equipment is used to enable employees to perform their work outside the Tempo. Teleworking does not include the use of mobile phones outside the Tempo's premises.
Teleworking must be authorised by an employee Manager with written or verbal approval.
Acceptable Use:
Use only approved devices for work (company laptop, approved personal device for work, …)
Connect to the home WiFi network or a private mobile hotspot protected with a secure password (see Acceptable and Unacceptable Use of User Accounts and Passwords)
Lock device when not in use.
Use device in a separate room with appropriate space to do your work and have remote video calls.
Unacceptable Use:
Share company device (and/or approved personal devices for work) with members of the household/visitors.
Leave device unattended in public spaces (coffee shops, airports, etc.).
Use unsecure/open and public internet access points.
3.10 Acceptable and Unacceptable Use of Personal Devices (Bring Your Own Device) For Employees
Acceptable Use:
Register your BYOD device for approval with the DPO by providing device information and intended business use;
Right to audit: By accepting this BYOD policy you accept that the DPO can audit your device for compliance requirements enlisted in this section at any point during your engagement at Tempo for security purposes. You agree to comply with providing the DPO any required system/application logs from your device in case of a security incident and need for investigation.
Connect personal devices (not used for business purposes) to Tempo provided Guest Wi-Fi network;
Connect to corporate applications using Tempo approved technologies only, such as VPN and with an approved BYOD device;
Store all Tempo Business Sensitive Information on Tempo provided cloud storage platform;
Protection of IT User’s personal devices will not be Tempo’s responsibility. However, Tempo requires that all personal devices (Laptops, Tablets, Smartphones) that are used to connect to corporate applications have the following security mechanisms enabled:
Latest operating system, software and security patches with automatic updates turned on;
Up to date anti-virus software;
Specific Tempo provided anti-virus software installation is mandatory on an approved BYOD device in case of IT user regular access to PHI data as part of their role at Tempo;
Lockscreen access control using a password, PIN or biometric as applicable;
Remote locate and wipe capability implemented/turned on;
Auto-lock device option set to no more than 15 minutes of inactivity;
Personal firewall (Laptops only);
Local storage encryption turned on;
For guidance and support in implementing these controls contact the DPO at dpo@tempoaudits.com.
Unacceptable Use:
Connect personal laptops to Tempo’s corporate wired or wireless networks;
Access corporate applications with a non-approved BYOD device;
Store Tempo Business Sensitive Information on personal devices local storage;
3.11 Exceptions
Any exceptions to this standard will require written authorisation by email from the DPO. Exceptions granted will be issued a policy waiver for a defined period of time. Requests for exceptions to this policy should be addressed to the DPO at dpo@tempoaudits.com.
3.12 Governance and Enforcement
Non-conformance to this standard could result in disciplinary action including, but not limited to, informal or formal warnings, up to termination of contract.
APPENDIX A - LIST OF APPROVED SERVICES
Calendly
Provided Services: Meeting scheduling and management platform
Vendor Website: https://calendly.com/
Owner: Rob Hall
Canva
Provided Services: Cloud hosted UI/UX Design tools
Vendor Website: https://www.canva.com/
Owner: Rob Hall
ChatGPT
Provided Services: AI LLM
Vendor Website: https://chatgpt.com/
Owner: Rob Hall
Dropbox Sign
Provided Services: Digital signature platform for documents
Vendor Website: https://sign.dropbox.com/en-GB/
Owner: Rob Hall
GoDaddy
Provided Services: Domain registry
Vendor Website: http://godaddy.com/
Owner: Rob Hall
Google Workspace
Provided Services: Collaboration platform, email hosting, document management
Vendor Website: https://workspace.google.com/
Owner: Rob Hall
Global-Regulation (Regnet)
Provided Services: Legal regulation software
Vendor Website: https://www.global-regulation.com/
Owner: Rob Hall
Linkedin
Provided Services: Talent sourcing, Company news publishing platform
Vendor Website: https://www.linkedin.com/
Owner: Rob Hall
Loom
Provided Services: Screen recording software
Vendor Website: https://www.loom.com/home
Owner: Rob Hall
Notion
Provided Services: Document management, collaboration platform
Vendor Website: https://www.notion.so/
Owner: Rob Hall
Slack
Provided Services: Instant messaging and collaboration platform. Customers have their own slack tenants and are responsible for their access management.
Vendor Website: https://slack.com/
Owner: Rob Hall
Tally
Provided Services: Cloud-based form and survey solution
Vendor Website: https://tally.so/
Owner: Rob Hall
Udemy
Provided Services: eTraining platform
Vendor Website: https://www.udemy.com
Owner: Rob Hall
Squarespace
Provided Services: Website builder platform
Vendor Website: https://squarespace.com/
Owner: Rob Hall
Zoom
Provided Services: Video Conferencing platform
Vendor Website: https://zoom.us/
Owner: Rob Hall
1Password
Provided Services: Cloudbased Password Storage
Vendor Website: https://1password.com/
Owner: Rob Hall
Management System Document Reference: POL9
Version: 1
Issue Date: 25/8/2024