This box is not visible in the printed version.
The Information Security Policy for the Gambling Commission.
Published: 20 March 2025
Last updated: 24 April 2025
This version was printed or saved on: 11 May 2025
Online version: https://www.gamblingcommission.gov.uk/policy/information-security-policy
1.1. This document defines the Information Security Policy for the Gambling Commission.
1.2. This document forms a key component of overall information governance and should be used in conjunction with other policy documents that provide more detailed information.
1.3. The primary objective of the Information Security Policy is to provide a framework for other policies. This will define the organisational structure to protect the Confidentiality, Integrity, and Availability of Commission systems and information.
1.4. The policies listed in section 6 of this policy complement the Information Security Policy. They provide further context to the overall processes, procedures and standards to be used and referenced by colleagues.
2.1. The purpose of this policy is to ensure the Gambling Commission’s effective operation of information systems, and that those systems are delivered when and how they are needed.
2.2. The policy will aim to preserve the 3 major categories of information security:
2.3. The scope of the Information Security Policy covers the storage, access and transmission of information during Commission business. It therefore applies to the conduct of colleagues, contractors, suppliers and others with access to that information (wherever the information or they are located) as well as the applications, systems, equipment and premises that create, process, transmit, host, or store information, whether in-house, personally owned or provided by external suppliers.
2.4. The Commission is committed to preserving the confidentiality, integrity and availability of all our key information assets to effectively deliver strategic goals and to maintain its legal and contractual compliance and reputation.
2.5. This policy is owned by the Commission’s Security Governance Group, who will:
3.1. All colleagues
3.2. All individual users of Gambling Commission information systems and those handling or having access to Commission information outside of those systems shall be responsible for:
3.3. Senior Information Risk Owner (SIRO) The SIRO at the Commission is the Chief Technology Officer who is ultimately responsible for Information Security Standards and Incident Response.
3.4. Information Asset Owner (IAO) The IAOs are owners for allocated Information Assets that are recorded in our Information Asset Register (IAR) and directly relate to the functions and activities that IAOs oversee.
3.5. Data Protection Officer (DPO) The DPO at the Commission is the Head of Governance and is ultimately responsible for all data processing activities.
4.1. Compliance
4.2. All information security policies and practices support and facilitate good information management and support the Commission’s wider values and strategic objectives.
4.3. Commission security objectives:
4.4. The Commission’s Security Governance Group will monitor security objectives and review them annually.
4.5. The Commission’s Security Governance Group will ensure that these objectives support the management of risk, in particular:
5.1. Adherence to the Information Security Policy is essential for ensuring the security and effectiveness of the Gambling Commission’s Digital, IT and Facilities environment.
5.2. It is mandatory that all employees comply with this policy, any non-compliance may lead to proportionate formal action.
5.3. To support all areas of the organisation, the Commission will provide ongoing training and resources that ensure that all colleagues understand the policy and its requirements.
5.4. This policy will help to maintain a secure and efficient working environment for all Commission colleagues.
The related policies to the Information Security policy are:
7.1. To be reviewed annually. Next review date due January 2026.
8.1. Regulations
8.2. Compliance Standards and Guidance
Version history record:
Version | Author and/or reviewed by | Date | Description of change |
---|---|---|---|
1.2 | Senior Officer – Information Management | February 2021 | Review. No change |
1.3 | Security and Business Continuity Manager | March 2024 | Updated some of the key roles as they had changed. Some minor changes to other parts of the policy |
1.4 | Security and Business Continuity Co-ordinator | 11 October 2024 | Updated format and reviewed content |
1.5 | Security and Business Continuity Co-ordinator | 14 October 2024 | Reviewed content, updated, added reference to further policy documentation |
1.6 | Security and Business Continuity Co-ordinator | 20 November 2024 | Reviewed based on most recent comments. Further work on sections: 2.6, 3.3, 4.5, 5.0 |
1.7 | Security and Business Continuity Co-ordinator | 25 November 2024 | Further review based on previous comments. Ready for review by group and then PRP |
1.8 | Security and Business Continuity Co-ordinator | 20 December 2024 | Further review based on PRP feedback |
1.9 | Security and Business Continuity Co-ordinator | 02 January 2025 | Further review |