This is an external facing version of our Information Security Policy. A more detailed version is available upon request.
1. Purpose
Layer Systems takes information security seriously and recognises the trust customers place in us when using The Layer platform.
This policy explains, at a high level, how we protect customer data and maintain the security, availability, and reliability of our systems.
2. Scope
This policy applies to:
- The Layer platform and supporting services
- All customer data processed by Layer Systems
- All employees and contractors who access Layer Systems’ systems or data
3. Our Approach to Information Security
Layer Systems operates a cloud-hosted SaaS platform and applies security controls that are appropriate to our size, technology stack, and operating model.
Our approach focuses on:
- Preventing unauthorised access to customer data
- Protecting data from loss or corruption
- Ensuring systems remain available and recoverable
Security is treated as a shared responsibility across engineering and operations, with clear ownership at senior technical level.
4. Data Protection & Handling
Customer data is processed only to deliver contracted services.
We:
- Store customer data in managed cloud infrastructure
- Restrict access to authorised personnel on a need-to-know basis
- Apply controls to protect data during normal operation, maintenance, and support activities
Data handling practices are supported by documented backup, recovery, and restore procedures, which are tested as part of routine operations.
5. Access Control
Access to Layer Systems’ environments is tightly controlled.
- All users have unique accounts
- Access is granted based on role and responsibility
- Administrative access is limited to a small number of authorised individuals
- Access is removed promptly when roles change or when a person leaves the organisation
6. Encryption & Secure Communication
- All access to The Layer platform takes place over encrypted connections
- Customer data is protected at rest using encryption provided by the underlying cloud platform
- Encryption keys are managed within the hosting environment and are not shared externally
7. Infrastructure, Availability & Recovery
The Layer platform is hosted in a cloud environment designed for resilience and recovery.
Key measures include:
- Redundant application and database components
- Regular, automated backups with defined recovery objectives
- Tested restore processes
- The ability to recover services in the event of infrastructure or site failure
These measures are documented internally as part of our disaster recovery and service continuity planning.
8. Monitoring & Incident Management
Layer Systems monitors the health and availability of its systems on an ongoing basis.
- System and service issues are investigated promptly
- Security-related events are assessed and escalated where necessary
- Customers are informed of material service or security incidents in line with contractual obligations
9. Third Parties & Contractors
Layer Systems uses a small number of trusted third parties to support platform hosting, development, and testing.
- Third parties are engaged only where appropriate
- Contractors with system access are bound by confidentiality obligations
- Overall responsibility for security remains with Layer Systems
10. Workforce Responsibilities
All employees and contractors are expected to:
- Follow secure working practices
- Protect customer and company information
- Comply with confidentiality and acceptable use requirements
Failure to follow security expectations may result in disciplinary action.
11. Review & Maintenance
This policy is reviewed periodically to ensure it remains accurate and appropriate as the platform and organisation evolve.
12. Contact
For questions relating to information security, please contact:
Layer Systems Ltd
Email: support@layersystems.com