We provide solutions to help you expand into markets, make informed decisions, and stay ahead of trends.
Deliver personalised email campaigns that engage audiences and drive measurable cost-effective results.
Drive direct connections with precision-targeted telemarketing supported by verified, compliant data.
Create impactful, personalised direct mail campaigns with seamless design, printing, and distribution.
Inspire action and increase donations with donor specific data, and multi-channel campaigns.
Centralised marketing drives consumer demand to franchisees while maintaining brand consistency.
Engage buyers at the key point in their purchase journey through behavioural data and accurate tailored messaging.
Join us as an Agency Partner to gain access to high quality consumer and business data sets and behavioural insights.
Influence voters with precise targeting, rapid polling, and multi-channel outreach strategies.
We provide solutions to help you expand into markets, make informed decisions, and stay ahead of trends.
Deliver personalised email campaigns that engage audiences and drive measurable cost-effective results.
Drive direct connections with precision-targeted telemarketing supported by verified, compliant data.
Create impactful, personalised direct mail campaigns with seamless design, printing, and distribution.
Inspire action and increase donations with donor specific data, and multi-channel campaigns.
Centralised marketing drives consumer demand to franchisees while maintaining brand consistency.
Engage buyers at the key point in their purchase journey through behavioural data and accurate tailored messaging.
Join us as an Agency Partner to gain access to high quality consumer and business data sets and behavioural insights.
Influence voters with precise targeting, rapid polling, and multi-channel outreach strategies.
This document sets out Buzz Saw’s arrangements for:
Revision | Date | Record of Changes | Approved By |
0.0 | 01/01/2020 | Initial Issue | JE/WS |
The digital version of this document is the most recent version. It is the responsibility of the individual to ensure that any printed version is the most recent version. The printed version of this manual is uncontrolled, and cannot be relied upon, except when formally issued by the ISMS Manager and provided with a document reference number and revision in the fields below:
Document Ref | Rev. | Uncontrolled Copy | X | Controlled Copy |
Standard | Title | Description |
SO 27000:2014 | information security management systems | Overview and vocabulary |
SO 27001:2013 | information security management systems | Requirements |
ISO 27002:2013 | information technology-security techniques | Code of practice for information security controls |
ISO 27001:2013 | information security management systems | Clause A.11 Physical and environmental security |
“staff” and “users” means all of those who work under our control, including employees, contractors, interns etc.
“we” and “our ”refer to Buzz Saw
The ISMS Manager is jointly responsible with the Facilities Manager for all aspects of the implementation and management of these arrangements, unless noted otherwise.
Managers and supervisors are responsible for the implementation of these arrangements within the scope of their responsibilities and must ensure that all staff under their control understand and undertake their responsibilities accordingly.
Where appropriate, we provide secure areas to prevent unauthorised physical access, damage, and interference to our information and information processing facilities.
Security perimeters have been defined and are used to protect areas that contain either sensitive or critical information and information processing facilities.
Physical security perimeters, including barriers such as walls,card-controlled entry gates, or manned reception desks, are implemented taking into account the following guidelines:
Secure areas are protected by appropriate entry controls to ensure that only authorised staff are allowed access.
The date and time of entry and departure of visitors to secure areas are recorded and all visitors are supervised unless their unsupervised access has been previously approved. Visitors are only granted access for specific authorised purposes and are briefed, in advance, on the security requirements of the area and on emergency procedures.
Authentication controls (access control card plus PIN to be entered at the door or similar)are used to authorize and validate all access. An audit trail of all access is securely maintained.
All employees, contractors, and visitors are required to wear some form of visible identification. All employees, contractors and visitors are required to immediately notify security staff if they encounter unescorted visitors and anyone not wearing visible identification.
Third-party support service staff are granted restricted access to secure areas only when required, and this access is authorised and monitored.
Access rights to secure areas are regularly reviewed and updated and revoked when necessary.
Physical security for offices, rooms, and facilities have been designed and applied taking into account the following guidelines:
Where practicable, key secure facilities are to be sited so as to avoid access by the public.
Internal directories and plans identifying locations of sensitive information processing facilities are to be kept away from the public
Where practicable, buildings and facilities are to be made unobtrusive and give a minimum indication of their purpose, with no obvious signage identifying the presence of information processing activities.
Appropriate physical protection against damage from fire, flood, earthquake, explosion, civil unrest, and other forms of natural or man-made disaster have been put in place, taking into account the following guidelines:
Hazardous or combustible materials are stored at a safe distance from a secure area.
Where practicable, key secure facilities are to be sited so as to avoid access by the public.
Bulk supplies such as stationery are not stored within a secure area.
Backup equipment and media are sited at a safe distance from the location where they would be used.
Appropriate fire-fighting equipment is provided in suitable locations, and staff appropriately trained, in accordance with our fire risk assessment and fire safety policy.
We have established information security policies and procedures to be followed by staff working in secure areas.
Staff are made aware of only the existence of, or activities within,a secure area on a need to know basis.
Unsupervised working in secure areas is avoided both for safety reasons and to limit opportunities for malicious activities.
Photographic, video, audio or other recording equipment, such as cameras in mobile devices are not permitted in secure areas unless authorized.
Access points such as delivery and loading areas and other points where unauthorized persons could enter the premises are controlled and, where practicable, isolated from information processing facilities to avoid unauthorized access.
Visitors to Buzz Saw offices must:
Be accompanies at all times by an authorized access entry staff
Provided access to Visitor rooms (holding no information assets) as a preference
Limited in all activities by the Access Control Policy
Not have access to secure offices.
Where practicable, equipment is sited and protected to reduce the risks from environmental threats and hazards.
We reduce the risks and opportunities for unauthorized access by adopting the following measures, wherever practicable:
Equipment should be sited to minimize unnecessary access into work areas.
The viewing angle of information processing facilities handling sensitive data should be restricted to reduce the risk of information being viewed by unauthorized persons.
Storage facilities should be secured to avoid unauthorized access.
Items requiring special protection should be isolated to reduce the general level of protection required.
Controls should be adopted to minimize the risk of potential physical threats, e.g. theft, fire, explosives, smoke, water (or water supply failure), dust, vibration, chemical effects, electrical supply interference, communications interference, electromagnetic radiation, and vandalism.
Environmental conditions, such as temperature and humidity, should be monitored.
Lightning protection should be applied to all buildings and lightning protection filters should be fitted to all incoming power and communications lines.
We protect critical equipment from power failures and other disruptions caused by failures in supporting utilities.
The precautions we employ, where appropriate and practicable, include:
Incoming support utilities are regularly inspected and tested as appropriate.
An online UPS system having adequate backup time has been installed to support orderly close down or continuous running for equipment supporting critical business operations.
Power contingency plans cover the action to be taken on the failure of the UPS. A backup generator has been installed and an adequate supply of fuel is made available to ensure that the generator can perform for a prolonged period.
The UPS and generator are maintained and checked regularly to ensure there is adequate capacity.
Emergency power-off switches are located near emergency exits in equipment rooms to facilitate rapid power down in case of an emergency.
Emergency lighting is provided in case of main power failure.
An alarm system detects malfunctions in the supporting utilities.
Telecommunications equipment are connected to the utility provider by at least two diverse routes to prevent failure in one connection.
Voice services are adequately protected to ensure their continued functioning for emergency communications.
Power and telecommunications cabling carrying data or supporting information services are installed in such a way that they are protected from interception or interference or damage.
The precautions we employ, where appropriate and practicable, include:
Power and telecommunications lines into information processing facilities are situated below ground, or subject to adequate alternative protection.
Network cabling is protected from unauthorised interception or damage, by using a conduit (shield) or by avoiding routes through public areas.
Power cables are segregated from communications cables to prevent interference.
Clearly identifiable cable and equipment markings are used to reduce handling errors.
A documented patch list is used to reduce the possibility of errors.
For sensitive or critical systems further controls are used, including:
– Installation of armoured conduit and locked rooms or boxes at inspection and termination points
– Use of alternative routings and/or transmission media providing appropriate security
– Use of fiber optic cabling
– Use of electromagnetic shielding to protect against interference
– Initiation of technical sweeps and physical inspections for unauthorized devices being attached to the cables
– Controlled access to patch panels and cable rooms
We ensure that all equipment is properly maintained to ensure continued availability and integrity, including:
Equipment is maintained in accordance with the supplier’s recommended service intervals and specifications and, where appropriate, preventative maintenance is undertaken.
Only authorized maintenance staff are permitted to carry out repairs and service equipment.
Records are maintained of all suspected or actual faults, and all preventive, regular and breakdown maintenance.
Appropriate controls are implemented when equipment is scheduled for maintenance, including, where necessary, removing information from the equipment prior to maintenance.
The Facilities Manager maintains an ISMS Routine Maintenance Register, listing appropriate maintenance requirements and schedules, and ensures that such maintenance is carried out in a timely manner.
Equipment, information and software are not permitted to be removed from our premises or from secure areas without prior authorisation.
Security has been applied to off-site assets such as laptop computers and GPS systems, taking into account the various additional risks arising from working outside of our premises.
The use of any information processing equipment outside of our premises must be authorised in advance and staff are required to:
Not leave media or equipment unattended in public places.
Carry portable devices as hand luggage when traveling.
Take care not to expose devices to adverse environments, such as water and strong electromagnetic fields.
All items of equipment containing storage media are verified to ensure that any sensitive data and licensed software has been thoroughly removed or securely overwritten prior to disposal or re-use.
All users are made aware of the security requirements for protecting unattended equipment, as well as their responsibilities for implementing such protection.
We operate a clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities.
In addition:
Sensitive or critical business information in physical form is locked away (in a safe or cabinet or other forms of security furniture) when not required or when an office is vacated.
Facsimile machines are protected from unauthorized use.
photocopiers and other reproduction technology (e.g., scanners, digital cameras) are protected from unauthorized us
Documents containing sensitive or classified information are removed from printers immediately.
Records retained in support of this procedure are listed in the ISMS Controlled Records Register and controlled according to the Control of Management System Records Procedure.
Don’t have an account?