Cyber-Security Policy
Omega Legal Services is committed to maintaining a high standard of cyber-security to protect the confidentiality, integrity, and availability of information entrusted to us by our clients, partners, and stakeholders.
We comply with applicable legal requirements and recognised best-practice guidance in relation to cyber-security, including but not limited to The Pensions Regulator’s (TPR) cyber-security principles for pension schemes and guidance issued by the National Cyber Security Centre (NCSC).
Our Cyber-Security Approach
Omega Legal Services has implemented proportionate and risk-based technical and organisational measures to protect systems, networks, and data from cyber threats, unauthorised access, disruption, or loss. Our cyber-security framework is designed to support operational resilience and business continuity.
Key elements of our approach include:
- Secure IT infrastructure and access controls
- Regular risk assessment and monitoring of cyber threats
- Use of protective security measures in line with NCSC guidance
- Incident detection, response, and recovery procedures
- Business continuity and disaster recovery planning
Policies, Procedures, and Training
We maintain a comprehensive set of cyber-security policies and procedures to support compliance with legal and regulatory obligations and to reflect evolving cyber risks. These are supported by ongoing staff training to promote cyber-security awareness and good information-handling practices.
Our framework includes, where appropriate:
- Cyber-Security Policy
- Information Security Policy
- Incident Response and Breach Management Procedures
- Access Control and Password Management Standards
- Staff cyber-security awareness training
Continuous Review and Assurance
Omega Legal Services regularly reviews and updates its cyber-security measures to reflect changes in technology, threat landscapes, and regulatory guidance. We take a proactive approach to identifying vulnerabilities and strengthening our controls to ensure continued alignment with best practice.
Further Information
If you require further information regarding our cyber-security arrangements or controls, please contact us using the details provided on our website.
