pwc-isp-security-statement
pwc-isp-security-statement
Introduction 4
Scope 5
Security policy 6
Security organisation 7
Access controls 9
Data protection 12
Service management 13
System development 15
Resilience 16
Compliance programme 17
1.01 August 2018 FY19 review. Minor edits for consistency. ISRC Team
2.00 July 2019 FY20 review. Minor edits for consistency. IT GRC Policy Team
3.00 July 2020 FY21 review. Minor edits for consistency. IT GRC Policy Team
5.00 October 2022 FY23 review. Minor edits for consistency. IT GRC Policy Team
7.00 July 2024 FY25 review. Minor edits for consistency. IT GRC Policy Team
The PwC Information Security Policy (ISP) has been developed to safeguard the confidentiality, integrity, and availability
of the information and technology assets used by the PwC member firms and is aligned with ISO/IEC 27002:2022
Information technology - Security techniques Code of Practice for Information Security Management industry standard.
PwC personnel are the first line of defence in protecting Use of electronic communication tools, the internet and
and securing information and Member Firm assets. portable computer devices is permitted and encouraged
where such use supports the goals and objectives of the
Member firms are required to provide training and business. PwC personnel are responsible for proper use
guidance to all PwC personnel regarding how to be of these technologies to protect information and member
responsible with use of technology and tools. PwC firm assets.
personnel are accountable for complying with the ISP
Framework and must always report any suspected PwC maintains its own and respects others’ intellectual
violations through the appropriate reporting process. property rights, which includes third party software. PwC
personnel have a responsibility to the firm and clients to
Security responsibilities comply with rules for use of PwC and third party
intellectual property and protect creative ideas,
PwC member firm staff connected to the PwC network
innovations or inventions.
must conduct themselves in a manner consistent with
PwC’s Code of Conduct and operate in compliance with PwC member firms deploy and regularly update web
their responsibilities defined in the ISP Framework and traffic filtering software to block access to inappropriate
relevant standards at all times (for example, on websites from the PwC network. The PwC member firms
premises, at clients, or working remotely). must also establish and maintain email gateway service
that supports spam-blocking and anti-virus software for
Security and privacy awareness training
attachments.
PwC member firms provide regular security and privacy
Secure printing
awareness training to personnel that must be completed
within the timeframes specified. New PwC personnel are PwC member firm staff and third party suppliers must
required to agree to abide by security and privacy
use appropriate authorisation controls available on fax
policies. PwC firms are encouraged to periodically
and printer equipment when printing and sending
distribute newsletters and other communication methods
confidential materials.
to reinforce security awareness.
To the extent permitted by applicable laws and PwC member firms document their termination
regulations, PwC member firms screen all prospective process, including their process for collection of
personnel prior to making an offer of employment. These information assets and removal of access rights for
checks vary by country but may include financial profile, departing personnel.
education, professional licences and employment
verification.
Confidentiality agreements
Privileged access
Remote access
Privileged access provides permissions to a network,
system or application that results in higher risk functions PwC provides personnel with the facilities and
and requires additional controls to mitigate those risks. opportunities to work remotely to meet client demand or
Privileged access must be kept to a minimum to limit the business needs as appropriate. Each member firm must
risk of cyber attacks. Privileged access requests must be make any user authorised to work remotely aware of the
individually approved, periodically reviewed and acceptable use of portable computer devices and remote
documented with business justification. work rules. PwC member firms use virtual private
network (VPN) technology through a secure encrypted
communications channel where users are required to
authenticate using two-factor authentication.
Laptop security
Mobile devices
Data management procedures must clearly define relevant stakeholders (for example, information owner, information
custodian, data privacy/protection officer), data classifications based upon potential business impact of unauthorised
access and data lifecycle management (for example, retention, destruction, discovery, user education).
Data must be identified based on data classification and confidentiality requirements and must be protected with use of
encryption where appropriate (for example, at rest, during transmission) and consider compliance with local and
international laws.
When implemented with appropriate security controls, data loss prevention helps limit the exposure of confidential
information. PwC member firms must comply with data loss prevention controls for removable media, email, secure
instant messaging, file sharing, web browsers and other technologies. Devices must be configured to prevent writing to
unapproved removable media.
A retention schedule defines how long business records must be retained and organises records (for example, paper,
electronic, other media) based on data classification. Member firms must implement appropriate controls for handling
each data classification.
Member firms must also implement control procedures for disposal and destruction of data and technology equipment.
Controls must comply with business, legal and regulatory requirements.
Member firms are required to use a centralised inventory PwC reviews vulnerabilities, patches and fixes in order
tool and maintain an inventory of technology assets, to determine risk and the relative priority for patch
applications, data, and business process information deployment in accordance with the PwC security policy.
related to the assets. Member firms must implement procedures that include
appropriate approvals, timely identification, reporting and
treatment of vulnerabilities.
Development environments
Capacity management
PwC member firms maintain business continuity programmes that evaluate potential events and respond to actual events
to minimise disruption to services. They have dedicated recovery teams to develop, maintain and periodically test
processes and procedures related to business continuity and disaster recovery planning. PwC member firms' IT disaster
recovery plans should include a business impact analysis, business continuity and disaster recovery plans, testing, audit,
backup approach, training and awareness.
System backup
Systems are routinely backed up for disaster recovery purposes. Backup removable media must be encrypted,
transported securely, stored in a secure location and clearly identified.
ISO 27001
The PwC network information security compliance team has maintained an ISO certification covering their audit
programme which is subject to annual audits by independent practitioners.
Critical A classification applied to information, technology, software or physical assets that if disrupted,
disabled or significantly impacted for more than four hours would impact on the ability of the
business unit and/or member firm to conduct business.
PwC Personnel Partners, principals, staff, secondees, and third-party labour (including, without limitation,
contractors, consultants and temporary employees) of all PwC member firms, including
affiliates and subsidiaries.
Endpoint Computer hardware device that can access information on the PwC network. Computer
hardware devices include desktop computers, laptops, smartphones, tablets, thin clients,
printers and voice over IP telephony devices.
External connections Remote users or computers used to connect to the internal PwC network through the use of
private network, modem, Internet and other network connections that facilitate internal PwC
network activity from a location outside a member firm facility.
Personal data Any information about a person or from which a person can be identified. Personal data need
not be tied to a name and can include public data. If a person cannot be identified or
re-identified from the data, the data is not personal data.
Privileged access, Privileged users have higher levels of access than general users. Privileged users are granted
Privileged user access to network devices, systems, applications and/or data from elevated (read-only) up to
administrative (read/write) permissions. These permissions may allow access to change or
delete data, data structure, user access, access models, application/system configuration
and/or application code.
PwC PwC refers to the PwC network and/or one or more of its member firms, each of which is a
separate legal entity. Please see pwc.com/structure for further details.
Security incident An act or event that violates information security policies, controls, standards or relevant local
laws and regulations. Security incidents can be triggered by a single event such as a virus
outbreak or network breach. Often, security incidents are a combination of several seemingly
innocuous events which if not identified, contained and eradicated in a timely manner, can lead
to larger events that pose greater risk to an entire organisation.
Third party An organisation or person that is not a member of the PwC network.
pwc.com