Summit logoSummit logo
About us
Services
Strategy

Website planning that transforms growth plans into results.

Design

Conversion-focused designs that guide visitors to action

Development

Expert Webflow development delivering reliable performance and integrations

Advanced development

Complex integrations connecting websites to business-critical systems

Ongoing support

Continuous optimisation keeping your website driving results

Latest Case Studies
MSOS
Outdated Squarespace website not aligned with business goals of serving five user groups with complex backend integrations
View project
Why Webflow?Case studiesInsights
Contact us

Information Security Policy

1. Introduction

This Information Security Policy outlines the principles and guidelines that govern the information security practices at Summit International Ltd, also known as Summit Digital. This policy is designed to protect the confidentiality, integrity, and availability of the company's information assets and to ensure compliance with relevant laws and regulations.

2. Scope

This policy applies to all employees, contractors, third-party vendors, and any other individuals who have access to Summit International Ltd's information assets, systems, and networks.

3. Information Classification

All information assets within Summit International Ltd shall be classified based on their sensitivity and criticality as follows:‍

  • ‍Confidential: Information that, if disclosed, could result in financial, reputational, or legal harm to the company.‍
  • Internal: Information intended for internal use only, not meant for public disclosure.‍
  • Public: Information that can be freely shared with the public.

4. Responsibilities

  • ‍Management: Senior management is responsible for setting the tone for information security, providing necessary resources, and ensuring compliance with this policy.‍
  • Employees: All employees are responsible for adhering to this policy, following security best practices, and reporting any security incidents or vulnerabilities.‍
  • IT Department: The IT department is responsible for implementing and maintaining security controls, monitoring systems for breaches, and promptly addressing security incidents.

5. Access Control

  • Access to information assets shall be granted based on the principle of least privilege, ensuring that individuals have access only to the information necessary for their roles.
  • User accounts shall be protected with strong passwords, and multi-factor authentication shall be implemented for accessing critical systems.
  • Access to physical facilities and sensitive areas shall be restricted based on job requirements.

6. Data Protection and Privacy

  • Personally identifiable information (PII) and sensitive data shall be processed and stored in compliance with applicable data protection laws and regulations.
  • Data sharing with third parties shall follow proper agreements and guidelines to safeguard data privacy.

7. Security Awareness and Training

  • Regular security awareness training shall be provided to all employees to ensure they understand security risks, policies, and best practices.
  • Employees shall be educated about social engineering threats, phishing attacks, and how to respond to them.

8. Incident Response

  • A well-defined incident response plan shall be in place to detect, respond to, and recover from security incidents.
  • All employees shall promptly report any suspected security breaches or incidents to the IT department.

9. Remote Work and Mobile Security

  • Employees working remotely shall follow the same security practices as in the office environment.
  • Mobile devices accessing company resources shall be protected with strong authentication and encryption mechanisms.

10. Physical Security

  • Physical access controls, such as locks and access cards, shall be used to secure office premises and sensitive areas.
  • Sensitive documents and equipment shall be properly secured when not in use.

11. Compliance and Auditing

  • Regular audits and assessments shall be conducted to ensure compliance with this policy and applicable regulations.
  • Non-compliance with this policy may result in disciplinary actions.

12. Policy Review

  • This policy shall be reviewed and updated periodically to address evolving security threats and ensure its effectiveness.

By adhering to this Information Security Policy, Summit International Ltd aims to create a secure and resilient environment for its information assets, enabling the company to achieve its business objectives while maintaining the trust of its clients and partners.

Get in touch

To contact us via our contact form (https://www.summit-digital.co.uk).

This policy was updated on the 23rd August 2023.

Ready to work with Webflow experts who understand your ambitions?

Let's discuss how we can help you achieve your growth goals.

Book a discovery call
Get in touch
Summit logo
Creating high-converting websites that consistently drive leads. 
23 years of expertise. Webflow Enterprise Partner.
Winchester, Hampshire
01962 388 888
studio@summit-digital.co.uk
Services
StrategyDesignDevelopmentAdvanced developmentSupportWhy Webflow?
Company
About usOur journeyCase studiesInsightsFAQsContact us
Resources
Webflow vs WordpressWebflow vs Squarespace
Webflow Premium Partner Enterprise logo
Two Cyber Essentials certification logos, one labeled Certified Plus and the other Certified, both featuring a blue and green checkmark on a dark blue background.ISO 27001 Certified logoGoogle Cloud Partner logo
© Summit Digital 2025. All Rights Reserved. All copyrights for imagery and designs are entirely owned by the respective clients or collaborators they represent. No ownership is claimed. Designated trademarks and brands are the property of their respective owners.
Privacy Policy
Cookie Policy
Terms & Conditions