Our Services

We don't sell products or standard services, rather we focus on providing business advice and solutions in three main areas: security, privacy and compliance.


Security

From developing an ISO/IEC 27001 compliant Information Security Management System (ISMS), successfully and quickly gaining accredited certification, through to designing, building and testing secure wired & wireless network infrastructures, we've been there and done it for others and can do it for you.

We have experience in information security governance, strategy, programmes, policies, standards and awareness; critical infrastructure protection, resilience, business continuity, civil contingencies & emergency planning; physical and personnel security; penetration testing; internal audit and investigations.

Tags: BCM, BCP, BS25999, CLAS, CHECK, CNI, CREST, DR, ISO27001, NGN, PCI DSS


Privacy

From developing privacy policies and supporting processes, protecting the confidentiality of customers and users, through to ensuring that disclosures required under various legislation and regulations were properly assessed, challenged and made in a way that minimised direct and collateral intrusion.

We have experience of data protection and privacy policies and practice, requiring liaison with Government, regulators, law enforcement and intelligence agencies, as well as a broad and practical understanding of data protection and privacy related directives, legislation and regulations and their implications.

Tags: DPA, e-Privacy, PECR


Compliance

From developing acceptable use policies (AUP) for users at Internet Service Providers (ISPs), and establishing Internet Abuse Management teams to ensure effective enforcement, through to establishing full compliance with data retention regulations for all data types (fixed & mobile telephony, e-mail, web and VoIP).

We have experience of balancing legal, regulatory and contractual obligations with privacy, security and business objectives, including in support of data retention, disclosure of communications data, lawful intercept, computer misuse investigations, defamation, online harassment and copyright/IPR infringment.

Tags: 3-Strikes, CDPA, CMA, EU DRD, RIPA