Security Policy

Last updated: 09 August 2025
Contents 1. Security Approach 2. Technical & Organisational Controls 3. Third‑Party Providers 4. Incident Response 5. User Responsibilities 6. Security Contact

1. Security Approach

We protect the confidentiality, integrity and availability of our systems and data using a risk‑based approach aligned with industry good practices.

2. Technical & Organisational Controls

3. Third‑Party Providers

We vet vendors for security, confidentiality and data protection. Where data leaves the UK, we use appropriate transfer safeguards (e.g., IDTA/SCCs).

4. Incident Response

We operate an incident response process to assess, contain and remediate security events. Where required, we notify affected users and the ICO without undue delay.

5. User Responsibilities

6. Security Contact

Report a security concern: business@cyberpathinsight-uk.com | Tel: +44 730 999 6080.

This page summarises our web security posture and does not grant any warranty or contractual commitment.
If you have accessibility needs, you can request this page in an alternative format by emailing business@cyberpathinsight-uk.com.