Human Resource Security Policy


Document Number: ISMS-POL-HR-01

Classification: L1 — Policy (Domain)

Version: 0.1.1

Effective Date: February 18, 2026

Author: Lucas Shin — Security Director

Approved By: Richard — CISO

Next Review Date: February 2027

Parent Policy: Information Security Policy (ISMS-POL-ISP-01)


1. Purpose

This policy defines the human resource security requirements throughout the employment lifecycle — from hiring through to termination — to ensure that all personnel understand their security responsibilities and that organisational assets are protected when employment relationships change.

This policy addresses the people dimension of information security, complementing the technical controls defined in the BYOD Security Policy (ISMS-POL-BYOD-01) and M365 Workspace & Access Policy (ISMS-POL-M365-01).


2. Scope

2.1 Applicable Personnel

2.2 Employment Phases Covered

2.3 Out of Scope


3. Pre-Employment Security

3.1 Screening and Verification

CheckApplicable ToOwner
Identity verification (government-issued ID)All personnelCEO / Hiring Manager
Reference check (previous employer)All employeesCEO / Hiring Manager
Right to work verificationAll personnel (NZ employment law)CEO / Hiring Manager
Professional qualification verificationTechnical / security rolesSecurity Director
Proportionality note: As a 3–5 person SMB, Cybercraft conducts proportionate screening. Police vetting or financial background checks are not required unless a role involves access to client audit data or financial systems, in which case the CISO must approve the scope.

3.2 Terms of Engagement

Prior to granting access to any Cybercraft information assets, all personnel must sign:

DocumentPurposeRenewal
Employment Contract / Engagement AgreementDefines role, responsibilities, and security obligationsOn role change
Non-Disclosure Agreement (NDA)Protects confidential and client information from unauthorised disclosureOn engagement + annually
Acceptable Use Policy AcknowledgmentConfirms understanding of permitted and prohibited use of Cybercraft systemsAnnually

4. Security Obligations During Employment

4.1 BYOD User Consent and Acknowledgment

Derived from BYOD Security Policy (ISMS-POL-BYOD-01) Section 5.3:

4.2 Employee Security Responsibilities

Derived from BYOD Security Policy (ISMS-POL-BYOD-01) Section 4:

All personnel are required to:

4.3 Security Awareness

ActivityFrequencyAudienceOwner
Security policy briefing (onboarding)On joiningAll new personnelSecurity Director
Annual security awareness refresherAnnuallyAll personnelSecurity Director
Policy change notificationAd-hocAffected personnelSecurity Director
Incident lessons learned briefingPost-incidentAll personnelSecurity Director
Proportionality note: For a 3–5 person SMB, security awareness is delivered through direct briefings and Teams communications rather than formal LMS-based training. This is documented via meeting notes and acknowledgment records.

4.4 Contractor and Temporary Staff Requirements

Derived from BYOD Security Policy (ISMS-POL-BYOD-01) Section 2.2:


5. Termination and Change of Role

5.1 Offboarding Process

Cross-references: BYOD Device Lifecycle Procedure (BYOD-PROC-01) Section 5

StepActionOwnerTimeline
1Manager/CEO notifies Security Director of personnel departureCEO / ManagerMinimum 1 business day before last day
2Security Director initiates selective wipe on BYOD device (work data only)LucasEmployee's last working day
3Disable Entra ID account (blocks all M365/SaaS access)LucasEmployee's last working day
4Remove device from Intune inventoryLucasWithin 24 hours of last day
5Revoke M365 licence assignmentLucasWithin 7 days
6Remove from all Teams teams/channelsLucasWithin 24 hours of last day
7Remind departing personnel of ongoing NDA obligationsCEO / Security DirectorLast working day
8Document offboarding completion in offboarding checklistLucasWithin 72 hours

5.2 Change of Role

When personnel change roles within Cybercraft:


6. Roles and Responsibilities

RolePersonResponsibilities
CEOFarahExecutive sponsor, final authority on hiring decisions, resource allocation, NDA enforcement
CISORichardPolicy approval, exception approval for enhanced screening, annual management review
Security DirectorLucasPolicy maintenance, onboarding/offboarding execution, security awareness delivery, consent management, access provisioning/deprovisioning
All PersonnelAll staffComply with security policies, report incidents, complete awareness activities, sign required documents

7. Compliance Mapping

ISO 27001 ControlRequirementCovered By
A.6.1ScreeningSection 3.1 (Pre-employment screening)
A.6.2Terms and conditions of employmentSection 3.2 (Terms of engagement) + Section 4.1 (BYOD consent)
A.6.3Information security awareness, education and trainingSection 4.3 (Security awareness)
A.6.4Disciplinary processSection 4.2 (Employee responsibilities — non-compliance consequences per master policy)
A.6.5Responsibilities after termination or change of employmentSection 5 (Termination and change of role) + NDA obligations
A.6.6Confidentiality or non-disclosure agreementsSection 3.2 (NDA requirement)

8. Document Control

VersionDateAuthorChanges
0.1.02026-02-18Lucas ShinInitial release — incorporates HR-related controls from BYOD Security Policy and establishes full employment lifecycle security framework.
0.1.12026-02-20Lucas ShinL2 policy reordering (renumbered). Updated all cross-reference document numbers to reflect new P-numbering scheme.

Review Schedule


[End of Policy Document]