top of page

Information Security Policy

Scope:

This policy covers Panacea’s approach to Information Security management.

Policy:

  1. Panacea is dedicated to maintaining the highest levels of information security to ensure the protection of the subscriber and their business information. It aims to analyse, monitor and minimise risk to all our stakeholders.

  2. We aim to protect the confidentiality, integrity and availability of customer data and all information on our systems, in line with our Privacy Policy (https://www.panacea-software.com/privacy-policy).

  3. Panacea maintains an Information Management system which meets, and continues to meet, the requirements of ISO 27001: 2013.

Panacea’s Responsibilities:

  1. To ensure that our systems, data and networks are constantly updated and improved to minimise information security risk.

  2. To ensure that these information assets are available only to appropriate, authorised users.

  3. To maintain a secure development cycle, including both automated and manual testing to ensure that each software component is fit for purpose. For example, we use regression testing to analyse the security and integrity of existing functionality.

  4. To maintain firewalls for our systems and keep them up to date.

  5. To monitor and ensure 99.9% uptime and availability of software.

  6. To ensure that we use only reliable and accredited sub-contractors

  7. To conduct annual penetration testing, using a certified third party, in order to minimise risk from hackers.

  8. To manage the safety and security of office premises, infrastructure and office assets.

  9. To conduct regular staff training and knowledge of user roles, access rights and IS requirements.

  10. To use secure multi-factor authentication and restrict access to information and applications.

  11. To consistently satisfy customers’ and other interested parties’ Information Security requirements.

  12. To provide the appropriate organisation and resources, employ the appropriate people, and where applicable to use reliable sub-contractors in order to ensure protection of information and other assets to fulfil stakeholders’ requirements effectively, efficiently, responsibly and securely.

  13. To continually review and monitor all aspects of business operations to identify opportunities for improving Information Security controls.

bottom of page