Skip to content

Information Security Statement

This statement was updated on 18th September 2020.

1. PageTiger policies, procedures, processes, reports and diagrams are confidential and cannot be externally disclosed with the exception of our public facing 'Privacy Notice' and ‘Cookie Notice’.

2. A consolidated summary of Information Security Policy Statements is available and disclosable for clients or prospect clients on request to support sales onboarding, Information Security due diligence or retrospective compliance audit.

3. Additionally PageTiger can provide temporary access for clients or prospect clients to an online ‘Compliance Portal’ for self-service Information Security due diligence. The topics addressed in the portal are:
  • Company information
  • Finance & accounting
  • Bankers & payment info
  • GDPR
  • Application & Interface Security
  • Audit Assurance & Compliance
  • Business Continuity Management & Operational Resilience
  • Change Control & Configuration Management
  • Data Security & Information Lifecycle Management
  • Data Centre Security
  • Encryption & Key Management
  • Governance & Risk Management
  • HR
  • Identity & Access Management
  • Infrastructure & Virtualisation Security
  • Interoperability & Portability
  • Mobile Security
  • Security Incident Management, E-Discovery & Cloud Forensics
  • Supply Chain Management, Transparency & Accountability
  • Threat & Vulnerability Management

4. Our Information Security Management System ISMS is aligned to these Information Security objectives:

  • Preserve the operations & continuity of the business;
  • Maintain an operational risk management framework;
  • Maintain legal, regulatory & contractual compliance;
  • Maintain profitability & cash-flow;
  • Maintain commercial image & brand reputation;
  • The ISMS is subject to continuous review & improvement.
5. Management Leadership is demonstrated through:
  • Establishment of an Information Security policy
  • Establishment of objectives and plans for the ISMS;
  • Integration of the ISMS into the firms processes;
  • The importance of Information Security and adherence to our policies is communicated & trained to the organisation;
  • Making resource available to establish, implement, operate, monitor, review, maintain and continually improve the ISMS;
  • Ensuring that the ISMS achieves its objectives;
  • Ensuring internal ISMS audits are conducted to maintain compliance with Cyber Essentials and ISO 27001: 2017

6. We are Cyber Essentials certified and Financial Services Qualification System FSQS registered.