Information Security Policy

MeshX Software Ltd

Document ref:MESHX-ISP-001
Version:1.0
Classification:Public
Effective date:6 April 2026
Next scheduled review:6 October 2026
Owner:Jamie, Director — MeshX Software Ltd
Approved by:Jamie, Director

Contents

  1. Purpose, Scope and Review
  2. Network Security and Segregation
  3. Endpoint Protection
  4. Security Baseline for Daily Operations
  5. Access Control and Least Privilege
  6. Data Classification and Encryption
  7. Incident Response
  8. Vulnerability and Threat Management
  9. Data Breach Notification
  10. Document Control and Revision History

1. Purpose, Scope and Review

1.1 Purpose

This policy establishes the information security framework for MeshX Software Ltd ("MeshX", "we", "us"). It defines the security controls, responsibilities, and procedures that protect the confidentiality, integrity, and availability of data processed by MeshX and its SaaS platform.

1.2 Scope

This policy applies to:

1.3 Review cycle

This policy is reviewed at least every six months, or sooner if triggered by:

All reviews are documented in the revision history (Section 10). The Director is responsible for approving updates and communicating changes to relevant personnel.

2. Network Security and Segregation

2.1 Architecture overview

MeshX operates a cloud-native architecture with no self-hosted servers exposed directly to the internet. All public-facing traffic passes through managed platforms with built-in network protections:

2.2 Segregation

2.3 Monitoring

3. Endpoint Protection

3.1 Anti-malware

All company endpoints (laptops, desktops, servers) run a current, supported operating system with built-in or managed anti-malware protection:

3.2 Operating system and software updates

3.3 Device security

4. Security Baseline for Daily Operations

4.1 Screen locking

All devices are configured to lock automatically after no more than 5 minutes of inactivity. Users are required to lock their device manually when stepping away (Win+L / Cmd+Ctrl+Q).

4.2 Password policy

4.3 Multi-factor authentication (MFA)

MFA is enforced on all critical systems:

TOTP (time-based one-time password) or hardware security keys are the accepted MFA methods. SMS-based MFA is avoided where alternatives exist.

4.4 Clean workspace

MeshX operates as a digital-first organisation. Sensitive data is not printed. No physical documents containing personal data or credentials are stored at workstations.

5. Access Control and Least Privilege

5.1 Principles

5.2 Administrative access

5.3 Application-level access control

The MeshX platform implements role-based access control at the application level:

5.4 Access review and offboarding

6. Data Classification and Encryption

6.1 Data classification

MeshX classifies data into three tiers:

Tier Examples Handling
Confidential Marketplace OAuth tokens, Stripe API keys, database credentials, customer payment metadata, session tokens Encrypted at rest and in transit. Access restricted to named personnel with a business need. Never logged in plaintext. Rotated on suspected compromise.
Internal Customer account data (email, name, company), order details, design files, internal documentation Encrypted in transit. Stored in access-controlled systems. Shared internally on need-to-know basis only.
Public Published policies, marketing content, public website No access restrictions. Published via HTTPS.

6.2 Encryption in transit

6.3 Encryption at rest

7. Incident Response

7.1 Definition

A security incident is any event that compromises or may compromise the confidentiality, integrity, or availability of MeshX systems or data. Examples include: unauthorised access, credential compromise, data exfiltration, malware infection, denial of service, or accidental exposure of personal data.

7.2 Roles and responsibilities

Role Person Responsibility
Incident Lead Director Overall accountability, escalation decisions, external communications, regulatory notifications
Technical Responder Director / designated engineer Investigation, containment, remediation, evidence preservation

7.3 Response procedure

  1. Detect and report: Any person who suspects a security incident must report it immediately to the Incident Lead via security@meshx.uk or direct message. Reports are acknowledged within 4 hours during business hours.
  2. Triage and contain: The Incident Lead assesses severity and scope. Immediate containment actions are taken (e.g. revoking compromised credentials, disabling affected accounts, isolating affected systems).
  3. Investigate: The Technical Responder gathers evidence (logs, access records, affected data scope) and determines root cause.
  4. Notify: If personal data is involved, the breach notification procedure in Section 9 is activated.
  5. Remediate: The vulnerability or control failure that allowed the incident is fixed. Preventive measures are implemented to reduce the likelihood of recurrence.
  6. Post-incident review: A brief post-mortem is written within 5 business days, documenting what happened, the timeline, impact, root cause, and actions taken. Lessons learned are fed back into this policy at the next review.

7.4 Communication channels

8. Vulnerability and Threat Management

8.1 Dependency management

8.2 Platform and OS patching

8.3 Application security

8.4 Threat awareness

9. Data Breach Notification

9.1 Scope

This procedure applies to any confirmed or suspected breach involving personal data processed by MeshX, whether the data belongs to customers, sellers, marketplace end-buyers, or staff.

9.2 Internal reporting

Any person who becomes aware of a potential data breach must report it to the Incident Lead (Director) within 24 hours of discovery, using the channels defined in Section 7.4.

9.3 Assessment

Within 48 hours of the initial report, the Incident Lead will:

9.4 Regulatory notification

If the breach is likely to result in a risk to individuals' rights and freedoms, MeshX will notify the Information Commissioner's Office (ICO) within 72 hours of becoming aware of the breach, as required by UK GDPR Article 33. The notification will include:

9.5 Notification to affected individuals

Where the breach is likely to result in a high risk to individuals' rights and freedoms, MeshX will notify affected individuals without undue delay, in clear and plain language, describing:

9.6 Notification to marketplace partners

Where the breach involves data obtained via marketplace APIs (e.g. TikTok Shop, Etsy, eBay), MeshX will notify the affected marketplace partner(s) via their designated security or partner support channels, in accordance with the partner's data processing agreement or API terms.

9.7 Record keeping

All breaches, whether or not they are reportable to the ICO, are recorded in an internal breach register. Each entry documents: the facts of the breach, its effects, the remedial action taken, and the rationale for any decision not to notify the ICO or affected individuals.

10. Document Control and Revision History

Version Date Author Changes
0.1 22 March 2026 Jamie Initial security overview (summary document)
1.0 6 April 2026 Jamie Full policy: expanded to 10 sections covering network security, endpoint protection, security baseline, access control, data classification, incident response, vulnerability management, and data breach notification. Replaces previous summary document.

Approved by: Jamie, Director — MeshX Software Ltd

Date: 6 April 2026

Last updated: 6 April 2026 · Version 1.0