Security Notice

Last updated: 20th March 2026

Frequently asked questions

Below are answers to some frequently asked questions about our security programme:
  • Information Security Policies, including Acceptable Use and Data Protection are in place, and shared with staff. Policies are reviewed at a minimum on a yearly basis.
  • A Senior Risk Owner for the enterprise has been assigned, alongside trained staff supporting governance, compliance, application and operations security responsibilities.  Regular governance meetings are held to monitor effectiveness of our programme.
  • Key suppliers are tracked and are reviewed throughout the year.
  • New suppliers are onboarded following a risk assessment, including a Data Protection Impact where appropriate.
  • A comprehensive Incident Response Plan is in place, with supporting playbooks for more detailed activities.  A cross business response team is responsible for managing any major incident.
  • Joiners and Leaver activities are tracked and authorised via our ticketing system, with leavers access being promptly removed at the end of employment.  An access review takes place as a compensating control to reduce the likelihood of anything falling through the gaps.
  • Role based access control is applied in respect of access to resources, with privileged rights being restricted to only those with a business justification to require them.
  • Personal Data for both Customers and their users is only accessible by InCrowd staff whose roles require access to that data to perform their job duties.
  • All employees are subject to a contract of employment and staff handbook with requirements regarding compliance with non-disclosure and internal policies.  All employees are subject to a probationary period, during which an onboarding process is carried out.
  • All staff have a mandatory yearly data protection training.
  • Guidance is provided on security topics such as remote working, social engineering and on handling Subject Access Requests
  • Regular reminders are provided to employees throughout the year on pertinent security news and emerging threats.
  • Employees are advised how to report security concerns.
  • User endpoints are fully managed, with vulnerability scanning, anti-malware agents and event monitoring.
  • Modern Anti-Malware controls are in use, with any detection alerts sent to our Security Operations function.
  • Devices have full disk encryption, USB storage devices are restricted, and screen lock timeouts enabled.
  • MFA is used extensively in key services, and in place for all remote access.
  • Regular vulnerability scanning takes place throughout the technology stack.
  • Vulnerability tickets are assigned to respective teams to address within the parameters directed in our standards.
  • All 3rd party software must be under vendor support, including the release of security updates.
  • We subscribe to vulnerability disclosure alert lists.
  • We will delete or destroy such data immediately following 30 days post termination.  Within that 30-day period, a customer may request the return of that data in a common readable format.
  • Data is logically separated by tenant.
  • Customer databases are backed up.
  • Scheduled restore testing takes place to verify integrity.
  • Protection against malware
  • Data is encrypted within database instances at rest.
  • TLS encryption is used for data in transit.
  • User endpoints have full disk encryption.
  • Data is encrypted within AWS RDS instances at rest.  TLS encryption for data in transit.
  • Data is encrypted within AWS RDS instances at rest.  TLS encryption for data in transit.

Monitoring

HVAC, Power

At the end of its life, all hardware is disposed of in line with our disposal standard, requiring secure overwriting or destruction, ensuring no data is recoverable.