Secure Data Hosting
We protect our clients’ data by preserving it in our own data hosting environment, which operates on its own independent forensic server. Our high-performance infrastructure is powered by an intelligent security model, allowing 24/7 access and maintenance by a handful of NPPV security cleared senior forensic specialists.
We are experienced in working in high-security environments where our systems need to be robust, secure, fully audited and access controlled. Our process for ensuring the security of sensitive data is backed up by our robust IT System, which enables us to store data, ‘locking down’ information that needs a restricted password protected access.
CYFOR’s secure data hosting network operates on its own independent forensic server. This network has no access to the internet ensuring that it cannot be compromised through remote access. All servers and forensic images are stored within our secure evidence store and are subject to the same physical protection as our exhibits.
To further evidence our commitment to safeguarding data security CYFOR have achieved the ISO/27001 Information Security Standard. Our ICT Systems have enhanced controls to manage risks, integrity and availability. Our Systems ensure we deliver a timely, secure and efficient sharing of information. We have document control and control of records procedures within our integrated management system covering access to restricted information and the safe storage of records for the mandatory number of years.
We operate independent networks to ensure that there is zero possibility of cross-contamination between data obtained as part of an examination, and data utilised as a part of the operation of the business.
CYFOR hold ISO/IEC 27001:2013 Information Security Management Certification and our security arrangements have been independently inspected by The Metropolitan Police.
CYFOR maintains SC cleared across the business and hold NPPV Level 3 security clearances across all our forensic facilities. NPPV Level 3 allows long term, frequent and uncontrolled access to secret police assets and occasional access to top-secret police assets.
CYFOR has extensive security arrangements in place to protect exhibits. Evidence stores are areas with the tightest security. All evidence is controlled via our Microsoft Dynamics Case Management system. Access to this is controlled so that only relevant security cleared staff can access these without supervision. All users have their own specific credentials which create an audit trail whenever they enter the store. CYFOR conduct a weekly random spot check to ensure the audit process is sufficient and being adhered to.
CYFOR is conscious of the need to ensure that our practices and procedures will survive detailed scrutiny. Strict protocols are in place to ensure that all evidence is secure and its integrity preserved. A strict procedure is in force for the handling of the original evidence and all exhibits are immediately resealed once they have been handled.
All internal forms contain checks to ensure that seals are secure and seal numbers are recorded as appropriate and a confirmation process is used which requires two members of staff to sign for the movement of evidence. All processes are documented and the complete case file is available for production where necessary.