top of page
Screenshot 2026-03-04 at 20.32.38.png

“Your workforce. Your direction. Our expertise.” - 20 years Experience.

Information Security Policy

Velma Group Ltd recognises the importance of protecting the information entrusted to us by our clients, workers, employees and partners. As an organisation that processes sensitive employment, payroll and personal data, maintaining strong information security practices is essential to our operations.

This Information Security Policy outlines our commitment to safeguarding information assets and ensuring that data is protected against unauthorised access, loss, misuse or disclosure.

Our approach to information security is designed to protect the confidentiality, integrity and availability of information while supporting the effective delivery of our services.

Purpose

The purpose of this policy is to establish a framework for protecting information and information systems used by Velma Group Ltd. It sets out the principles and responsibilities for ensuring that information is handled securely and responsibly across the organisation.

This policy supports compliance with relevant legal, regulatory and contractual obligations, including data protection legislation and industry best practices.

Scope

This policy applies to all individuals who access or process company information, including:

  • Employees

  • Contractors

  • Temporary staff

  • Consultants

  • Third-party service providers

It applies to all information assets owned or managed by Velma Group Ltd, including:

  • Digital systems and databases

  • Email and communication platforms

  • Paper records and documentation

  • Portable devices and storage media

  • Cloud-based systems and platforms

Information Security Principles

Our information security framework is based on the following key principles:

Confidentiality

Sensitive information must be protected from unauthorised access or disclosure. Access to information is granted only to authorised individuals who require it for legitimate business purposes.

Integrity

Information must be accurate, complete and protected from unauthorised modification. Processes are in place to ensure that data remains reliable and trustworthy.

Availability

Information and systems must remain accessible to authorised users when required. Systems are maintained and monitored to ensure operational continuity.

Responsibilities

Information security is the responsibility of everyone within the organisation.

Management Responsibilities

Senior management is responsible for:

  • Establishing and maintaining appropriate security policies

  • Ensuring adequate resources are allocated to information security

  • Promoting a culture of security awareness throughout the organisation

Employee Responsibilities

All employees and authorised users must:

  • Handle information securely and responsibly

  • Follow established security procedures

  • Protect login credentials and access information

  • Report security concerns or incidents immediately

Failure to comply with this policy may result in disciplinary action.

Access Control

Access to company systems and information is restricted to authorised users only.

Access controls are implemented through:

  • Secure user authentication procedures

  • Role-based access permissions

  • Password protection and security standards

  • Monitoring of system access

Users are only granted access to the information necessary to perform their duties.

Data Protection

Where personal data is processed, it is handled in accordance with applicable data protection legislation, including the UK General Data Protection Regulation (UK GDPR) and the Data Protection Act 2018.

Personal data is processed only where necessary and with appropriate safeguards in place to protect individuals’ privacy.

Secure Use of Technology

To maintain the security of our systems, we implement appropriate technical controls including:

  • Secure networks and firewalls

  • Regular software updates and patch management

  • Anti-virus and malware protection

  • Encryption of sensitive data where appropriate

  • Secure backup systems

Employees must use company systems responsibly and in accordance with internal policies.

Information Handling and Storage

Information must be stored and managed in a secure manner appropriate to its sensitivity.

This includes:

  • Secure storage of physical documents

  • Controlled access to digital systems

  • Proper disposal or destruction of confidential information

  • Secure handling of portable devices and storage media

Sensitive information must never be shared with unauthorised individuals.

Third-Party Security

Where third-party suppliers or service providers process information on behalf of Velma Group Ltd, appropriate safeguards are implemented to ensure that data remains protected.

This may include contractual agreements, security requirements and due diligence procedures.

Incident Management

In the event of a security incident or suspected data breach, immediate action will be taken to assess and contain the situation.

All employees must report any suspected security incidents promptly so that appropriate investigation and response measures can be implemented.

Where required by law, incidents will be reported to relevant regulatory authorities.

Business Continuity and Backup

To ensure the availability of information and services, Velma Group Ltd maintains appropriate backup and recovery procedures.

Regular backups are conducted to protect against data loss and to support business continuity in the event of system failure or disruption.

Training and Awareness

Employees are provided with guidance and training on information security responsibilities to ensure that they understand how to handle data safely and recognise potential security risks.

Maintaining a culture of security awareness is an essential part of our information security programme.

Policy Review

This Information Security Policy will be reviewed periodically to ensure it remains effective, up to date and aligned with evolving security risks, technologies and legal requirements.

Contact Information

Any questions regarding this policy or information security practices should be directed to:

Velma Group Ltd
Suite 1, 262 Cowley Road, Oxford, England, OX4 1UH
velmagroup@outlook.com

bottom of page