Skip to content

Access Control Policy


Access Control Policy

Document Owner: Pobl Tech Limited (T/A Pobl)

Overview

This policy defines how access to systems, services, and data is managed within Pobl.

Its purpose is to ensure that only authorised users can access information and systems, and that access is appropriate to each individual’s role. This supports the protection of client platforms and reduces the risk of unauthorised access, misuse, or data exposure.

Access control forms a core part of our wider information security approach.

Scope

This policy applies to:

All employees, directors, contractors, and temporary users
All systems, platforms, and environments managed or accessed by Pobl
All client systems and data accessed as part of service delivery

This includes development environments, hosting platforms, CMS platforms, cloud services, and internal support tools.

Access control principles

Access is managed in line with the following principles:

Role-based access control
Least privilege
Separation of duties
Accountability and auditability

Users are granted only the level of access required to perform their role, and no more.

User roles and permissions

Access levels are defined based on role and responsibility.

Typical roles include:

Content or editorial users
Administrators
System or infrastructure administrators

Elevated or system-level access is restricted to a small number of named individuals and must be approved by senior technical staff.

Account provisioning and removal

User accounts are created only following appropriate authorisation.

All access is assigned to named individuals
Shared accounts are not permitted

Access is removed promptly when:

A user leaves the organisation
A user’s role changes
Access is no longer required

This applies across both internal systems and client environments.

Authentication and credentials

Access to systems requires secure authentication.

Passwords are managed in line with Cyber Essentials guidance
Multi-factor authentication is enabled where supported, particularly for administrative access

Credentials must not be shared and should not be reused across systems.

Access review and monitoring

Access rights are reviewed:

When roles change
Following incidents or concerns
As part of regular governance and security reviews

Where supported, system access and administrative actions are logged, providing a clear audit trail for accountability and investigation.

Remote access

Remote access to systems is secured through authenticated connections and approved devices.

Administrative access over public or unsecured networks is avoided wherever possible.

Third-party access

Where third-party access is required:

Access is granted on a role-specific and time-limited basis
Permissions are restricted to what is necessary
Access is reviewed regularly and removed when no longer required

Policy review

This policy is reviewed:

At least annually
Following significant changes to systems, services, or security requirements
Following major incidents or identified risks
Governance
Document owner

The owner of this policy is the Technical Director, Pobl Tech.

Responsibilities

The Document Owner is responsible for:

Ensuring the policy remains accurate and up to date
Approving updates and changes
Ensuring the policy is communicated and applied across the organisation
Approval

This policy has been reviewed and approved by senior management.

Approval confirms that the policy:

Reflects current working practices
Aligns with legal and contractual obligations
Is appropriate for the scale and nature of services delivered

Review schedule

This document will be reviewed:

At least annually
Following significant changes to systems, services, or regulatory requirements
Following major incidents or material changes in risk
Distribution

This policy is available to relevant staff and can be provided to clients or auditors where required.

Final note

Access control is a fundamental part of how we protect systems and data.

By ensuring that access is controlled, monitored, and regularly reviewed, we reduce risk and maintain the integrity and security of the services we deliver.

Ready to turn ideas into bold digital experiences?