With this document you can:

This box is not visible in the printed version.

Information Security Policy

The Information Security Policy for the Gambling Commission.

Published: 20 March 2025

Last updated: 24 April 2025

This version was printed or saved on: 11 May 2025

Online version: https://www.gamblingcommission.gov.uk/policy/information-security-policy

Introduction

1.1. This document defines the Information Security Policy for the Gambling Commission.

1.2. This document forms a key component of overall information governance and should be used in conjunction with other policy documents that provide more detailed information.

1.3. The primary objective of the Information Security Policy is to provide a framework for other policies. This will define the organisational structure to protect the Confidentiality, Integrity, and Availability of Commission systems and information.

1.4. The policies listed in section 6 of this policy complement the Information Security Policy. They provide further context to the overall processes, procedures and standards to be used and referenced by colleagues.

Purpose and scope

2.1. The purpose of this policy is to ensure the Gambling Commission’s effective operation of information systems, and that those systems are delivered when and how they are needed.

2.2. The policy will aim to preserve the 3 major categories of information security:

2.3. The scope of the Information Security Policy covers the storage, access and transmission of information during Commission business. It therefore applies to the conduct of colleagues, contractors, suppliers and others with access to that information (wherever the information or they are located) as well as the applications, systems, equipment and premises that create, process, transmit, host, or store information, whether in-house, personally owned or provided by external suppliers.

2.4. The Commission is committed to preserving the confidentiality, integrity and availability of all our key information assets to effectively deliver strategic goals and to maintain its legal and contractual compliance and reputation.

2.5. This policy is owned by the Commission’s Security Governance Group, who will:

Individual responsibilities

3.1. All colleagues

3.2. All individual users of Gambling Commission information systems and those handling or having access to Commission information outside of those systems shall be responsible for:

3.3. Senior Information Risk Owner (SIRO) The SIRO at the Commission is the Chief Technology Officer who is ultimately responsible for Information Security Standards and Incident Response.

3.4. Information Asset Owner (IAO) The IAOs are owners for allocated Information Assets that are recorded in our Information Asset Register (IAR) and directly relate to the functions and activities that IAOs oversee.

3.5. Data Protection Officer (DPO) The DPO at the Commission is the Head of Governance and is ultimately responsible for all data processing activities.

Information Security Objectives

4.1. Compliance

4.2. All information security policies and practices support and facilitate good information management and support the Commission’s wider values and strategic objectives.

4.3. Commission security objectives:

4.4. The Commission’s Security Governance Group will monitor security objectives and review them annually.

4.5. The Commission’s Security Governance Group will ensure that these objectives support the management of risk, in particular:

Compliance

5.1. Adherence to the Information Security Policy is essential for ensuring the security and effectiveness of the Gambling Commission’s Digital, IT and Facilities environment.

5.2. It is mandatory that all employees comply with this policy, any non-compliance may lead to proportionate formal action.

5.3. To support all areas of the organisation, the Commission will provide ongoing training and resources that ensure that all colleagues understand the policy and its requirements.

5.4. This policy will help to maintain a secure and efficient working environment for all Commission colleagues.

Information Security related policies

The related policies to the Information Security policy are:

Policy review

7.1. To be reviewed annually. Next review date due January 2026.

References

8.1. Regulations

8.2. Compliance Standards and Guidance

Version history

Version history record:

Version history record
Version Author and/or reviewed by Date Description of change
1.2 Senior Officer – Information Management February 2021 Review. No change
1.3 Security and Business Continuity Manager March 2024 Updated some of the key roles as they had changed. Some minor changes to other parts of the policy
1.4 Security and Business Continuity Co-ordinator 11 October 2024 Updated format and reviewed content
1.5 Security and Business Continuity Co-ordinator 14 October 2024 Reviewed content, updated, added reference to further policy documentation
1.6 Security and Business Continuity Co-ordinator 20 November 2024 Reviewed based on most recent comments. Further work on sections: 2.6, 3.3, 4.5, 5.0
1.7 Security and Business Continuity Co-ordinator 25 November 2024 Further review based on previous comments. Ready for review by group and then PRP
1.8 Security and Business Continuity Co-ordinator 20 December 2024 Further review based on PRP feedback
1.9 Security and Business Continuity Co-ordinator 02 January 2025 Further review