medCrowd requires JavaScript - please enable JavaScript in your browser if you wish to use App.

Skip to Content

  Please use the latest version of a supported browser with JavaScript enabled:     Got it - don't show me this again


SUPPORTED MOBILE BROWSERS
ANDROID AND IOS
  • Chrome
  • Firefox
ANDROID ONLY
  • Android v5.0+
IOS ONLY
  • Safari
WINDOWS 10 MOBILE
  • Edge
SUPPORTED DESKTOP BROWSERS
WINDOWS AND MAC
  • Chrome 12+
  • Firefox 16+
  • Opera 15+
MAC ONLY
  • Safari 6+
WINDOWS ONLY
  • Edge
  • Internet Explorer 10+

Compliance

Classification Public
Location https://www.medcrowd.com/compliance/iso27001/policies/Compliance
Author Paul Gardner
Approver Felix Jackson
Approved 14th December 2016
Date Author Changes
19th June 2023 Paul Gardner Periodic review
6th June 2022 Paul Gardner Periodic review
16th February 2021 Paul Gardner Periodic review
12th February 2020 Paul Gardner Periodic review
15th May 2018 Paul Gardner Update to reflect migration of X:\
5th December 2016 Paul Gardner Initial

Introduction

This policy is part of the medDigital ISMS and must be fully complied with.

The purpose of this policy is to avoid breaches of legal, statutory, regulatory or contractual obligations related to information security and of any security requirements.

Identification

We have identified and documented the statutory, regulatory and contractual requirements and our approach to meet these requirements. We openly publish this information. This information must be updated as information systems and requirements evolve.

Intellectual property rights

The use of any third party intellectual property in medDigital products must be escalated to IT so that licensing can be evaluated and procured as necessary.

Protection of records

Records must be protected from loss, destruction, falsification, unauthorised access and unauthorised release, in accordance with legislation, regulatory, contractual and business requirements.

Privacy and protection of personally identifiable information

Privacy and protection of personally identifiable information shall be ensured as required in relevant legislation and regulation where applicable. More information can be found at DPA compliance.

Regulation of cryptographic controls

Cryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations. For more information, see our Cryptography policy.

Compliance with security policies and standards

Managers shall regularly review the compliance of information processing and procedures within their area of responsibility with the appropriate security policies, and document this review along with any findings and remediation work in M:\mD Managers\Compliance on a quarterly basis.

Technical compliance review

All information systems shall be reviewed by IT on a bi-annual basis for compliance with the information security policies and standards. This review should be documented, along with any findings and remediation work in M:\IT\Compliance.