The purpose of this document is to ensure that appropriate measures are put in place to protect corporate information and the information systems, services and equipment owned or utilized by M/s. Espreson Media, hereby known as Espreson Media.

The objectives of the Information Security Policy are:

To secure Espreson Media’s and its customers’ assets against theft, fraud, malicious or accidental damage, breach of privacy or confidentiality; and
To protect Espreson Media and its customers from damage or liability arising from the use of its facilities or services for purposes contrary to their intended to use.


This policy applies to all Espreson Media staff, its customers, or any other persons otherwise affiliated but not employed by Forte, who may utilize its infrastructure and/or access its applications with respect to the security and privacy of information.

Staff, Customer and Associate Access

Espreson Media provides its staff and customers with access to computing and communications services in support of their business and administrative activities. These facilities include access to solutions like email and/or Internet services.

Where a staff member or customer is assigned login credentials or system passwords they are responsible for maintaining the use and security of any User IDs and all activity associated with that ID. Knowingly disclosing passwords to others will be deemed a breach of policy and could result in termination of accounts.

Espreson Media expects its staff, customers, and associates to take all reasonable steps to ensure the integrity and security of its systems and data.

Contract / Temporary Access

Where temporary access is required for a specific purpose such as, but not restricted to, contract workers and ‘test’ accounts, a user expiry date based on the completion date of the required tasks must be used to ensure the temporary account is not accessible after that date.
In the case of ongoing maintenance and support from 3rd party companies, access must only be granted to the relevant facilities within the system and be restricted to only the systems for which they provide support.

Reliance on People

All specialized computing staff is required to ensure that all systems and procedures are well documented and that there are others who can act in a backup capacity as required.

Acceptable Usage

Identification of what is deemed acceptable (or unacceptable) usage of network, communication and Internet services.

Network Usage

Espreson Media provides staff, customers, and associates with access to computing and communications services in support of business solutions and administrative activities.

By signing the appropriate forms for obtaining access to Espreson Media systems, or accepting the online compliance button, users agree to abide by all policies that relate specifically to the use of these facilities. Any breach of these policies will be deemed an infringement and dealt with accordingly which could result in suspension of access privileges or in severe cases, account/service removal.

Interfering, in any way, with the Espreson Media network or associated equipment, be it intentional or accidental, is not permitted. Any such interference will be acted upon and may result in removal from the Forte network until an investigation can be completed and the source of the interference is removed.

Electronic Communications

Espreson Media encourages staff, customers, and associates to appropriately use electronic communication in order to achieve the mission and goals of their business and/or administrative duties. Espreson Media encourages the use of electronic communication to share information, to improve communication and to exchange ideas. Given that the internet places the high value on the open communication of ideas, including those new and controversial, the intention of Espreson Media is to maximize freedom of communication for purposes that further the goals of openness within a democratic society such as enjoyed in Australia, provided that no laws are broken.

The electronic communications services must not be used for the distribution of material that may be deemed offensive, discriminatory or defamatory or the publishing or advertising of personal events or activities.

Internet Usage

Espreson Media encourages staff, customers and associates to use the internet in order to further the strategic and operational objectives of their business or administrative duties. Espreson Media encourages the use of the Internet to share information, to improve communication and to exchange ideas.

Inappropriate usage of Internet facilities includes, but is not restricted to, accessing or posting of discriminatory, defamatory, offensive material or material that may create or promulgate a negative impression of Espreson Media.

Mobile Devices

Mobiles devices including, but not limited to, laptop and netbook computers, mobile phones, smartphones and tablet devices, are all subject to the same policies and procedures as for other computing and communication devices.

Logical Security

Implementing a suitable environment that protects the integrity, availability, and confidentiality of Espreson Media and its customers’ data by using logical or ‘computerised’ controls and processes.

Software Security

Software security specifically relates to access rights and protection of software packages supplied by, and for the use by, Espreson Media computer services infrastructure. All users of Espreson Media systems are supplied with a User Account for authentication and allocation of appropriate access rights to network facilities including software solutions. Access to such network facilities and software is also controlled by the use of secure passwords which must be changed on a regular basis.
All Espreson Media staff PCs and laptops must be set with an inactivity screensaver which requires a unique password to reactivate the underlying session and has an idle time of no more than 10 minutes before activation. As a means of allocating appropriate software packages to specific users, the use of an application deployment tool should be used. This can grant individuals or groups access to various programs and services in accordance to their duties and requirements through their user account.

End-Point Security and Antivirus Software

All Espreson Media issued PCs and laptops must run anti-virus software and automatic system locking after 10 minutes of inactivity. The Operating System must be set to auto update so that regular vendor updates reduce threat or risk of OS vulnerabilities. This is to ensure that the software is kept updated for the latest threats. There are also antivirus systems in place checking all incoming email into the organization and also on internally circulating emails.
It is expected that any nonstandard PC and/or laptop also have currently updated antivirus software installed, and it’s the owners/users responsibility to ensure this. Not having currently updated antivirus software installed may expose Espreson Media systems and infrastructure to potentially significant disruption and damage due to virus-infected computers.


It is essential that those requiring access to the Espreson Media computing system be issued with a unique login and password. This password is not to be shared with, or used by, any other individual and failing to comply will be treated as a serious breach of system security which may result in account termination.

Staff Passwords are to be set as complex. The complexity rules will include a minimum password length, character requirements and suitable password expiry period. In the event that access is required to Espreson Media data or a customers data, that is held under a specific user id and password and that person is unavailable to access the data due to unforeseen circumstances, a request to have the password reset may be made with the authorisation of the authorised customer contact point. This will only be considered when all other avenues to access the data have been exhausted. At the completion of the task accessing the required data, the password MUST be reset again and the appropriate person notified as soon as is practical.

Customer Passwords are to meet Espreson Media complexity rules as a minimum. These complexity rules will include a minimum password length, character requirements and will NOT include an expiry date as customer passwords have no requirement to expire at regular intervals. However, a 90-day password expiry is active and customers will be encouraged to change their passwords on a regular basis.

Patch Management

To ensure that all Espreson Media managed systems and applications are kept current and up-to-date, a central Patch Management Server is used. This server will send out any operating system and/or software updates, to Espreson Media systems, that are required to address any known software vulnerabilities. These updates will be distributed at the discretion of Forte and take place daily to mitigate risks of new zero-day vulnerabilities.
It will be the responsibility of system administrators to ensure that the servers under their control are kept updated with the required operating system and software updates and patches. Periodic checks will be performed on servers to assess their vulnerability status by the Espreson Media Information Security Officer in consultation with system administrators.

Data Security

Ensuring that the confidentiality of data contained in the information technology systems is maintained and access is made available to those who are authorized to see that data. This item should also be used in conjunction with confidentiality policies.

Confidential Data Security

To ensure the confidentiality and security of sensitive information contained on Espreson Media systems, it is essential that only those authorized to access such data are permitted to do so. Those who are permitted to access such information are granted appropriate access, as required by their job functions.  All customer information is secured from other customers by separate system partitions, independent management systems, and firewalls. All front end internet solutions will comply with Secure Socket Layer (SSL) technology to encrypt data between user browser and application server.

Anyone, staff or associate, who gains access to such information through methods other than those granted by an appropriately authorized person, shall be deemed as unauthorized and subject to disciplinary and/or legal action.

Staff and associates should be aware of their legal and corporate responsibilities in relation to appropriate use, sharing or releasing of information to another party. Any other party receiving restricted information must be authorized to do so and that the receivers of the data also adopt information security measures to ensure the safety and integrity of the data.

Communications Security

Communications can take various forms which include, but are not restricted to, voice via landline, voice via mobile phone, voice via computer network (VOIP), email, electronic file transfer, wireless access, Virtual Private Network (VPN) connections, dial-up modem, Infra-Red, Bluetooth and ITS network infrastructure.

Each of these communications methods poses its own unique security problems and needs to be addressed individually. In each case, where network communications is required, irrespective of type, only those methods as permitted by Espreson Media will be allowed and must be in accordance with Australian Communications Laws.

Security Incident Management

Specify how any breaches of security relating to the information systems will be identified and handled.

Reporting Security Problems

Any suspected inappropriate or illegal usage of Espreson Media Information services network and equipment should be reported to Forte immediately by following the instructions here: Incident Management

Emergency Plans

Disaster Recovery Plans, Business Continuity Plans, backup strategies and failover plans for the core Espreson Media services and infrastructure are the responsibility of Forte to ensure that any outages or disasters can be recovered from in the shortest possible time with a minimal amount of data or resource loss.


The escalation process for the rating of each reported event will be determined by the Espreson Media staff member in conjunction with the customer contact officer taking into account the event itself and other priorities at that time.

Monitoring and Reporting

Espreson Media representatives are authorized to monitor all aspects of the network and associated infrastructure. They are also able to report any suspected inappropriate and/or illegal activity to the customer contact officer and or legal authorities.

It is also the role of Espreson Media to actively monitor and analyze all network related activity included, but not restricted to, Internet Usage, email, and dissemination and use of programs and data across the Espreson Media network infrastructure to ensure probity.  Confidential customer information stored on isolated systems is not monitored for content.

This monitoring will be done for the sole purpose of identifying and responding to any suspected inappropriate activity.

Business Continuity

How to ensure that there will be minimal disruption to ITS services in the event of a disaster or the implementation of changes to systems and/or associated infrastructure.

Backup Requirements

All customer systems housed on Espreson Media computing infrastructure are backed up on a regular basis.  It is also strongly advised that all users save their work to their network drive as a separate form of backup.  Sites that are backed up under the Forte maintenance plan can be restored within 24 to 48 hours.

Change Control

To ensure that systems and services running within the Espreson Media infrastructure are maintained and kept running at maximum performance and functionality, it is often a requirement to perform maintenance and upgrades to equipment. To ensure that there is minimal disruption to essential services, appropriate Change Control procedures are to be followed. This is to ensure that the disruption is kept to a minimum and appropriate rollback procedures exist should there be issues during the system changes.

Disaster Recovery Plans

In the event of a disaster that impacts the infrastructure and/or services, the implementation of a Disaster Recovery Plan is essential. The DRP provides step by step procedures and processes required to ensure that services are returned to normal operation in the shortest possible time.