Information Security Overview
Approved by: Ian Chadwick — 26/01/2026
Commitment
Information security is fundamental to trust, resilience, and responsible technology delivery at WBP Equip. We are committed to protecting the confidentiality, integrity, and availability of information — including personal data, proprietary technology, and business-critical assets.
Governance and Oversight
Information security is managed as part of our broader governance, risk, and compliance framework. Senior management takes responsibility for setting the direction, resourcing, and oversight of our security arrangements. Security considerations are integrated into business planning, technology development, and operational decision-making.
Risk-Based Approach
We adopt a risk-based approach to information security, proportionate to our size, stage, and operational model. Security decisions are informed by consideration of:
- the sensitivity and classification of data and systems;
- the nature and purpose of technology use;
- the potential impact of security incidents; and
- the evolving threat landscape.
Access Control and System Protection
We implement appropriate access controls to protect information and systems. These include role-based access, authentication requirements, activity monitoring, and secure configuration practices. Access is restricted to authorised individuals and reviewed as appropriate.
Secure Development and Operations
Our technology development processes incorporate security considerations. These include environment separation, secure handling of data during development and testing, change management practices, and review of third-party components.
Third-Party and Supplier Security
Where third parties have access to systems or data, security considerations are factored into supplier selection and ongoing oversight. Contractual safeguards and appropriate due diligence support our approach.
Incident Awareness and Response
We maintain an awareness of security risks and have proportionate arrangements for the identification, containment, escalation, and resolution of security incidents. Lessons from any incidents are used to strengthen our security posture.
Training and Awareness
We recognise the importance of human factors in information security. Individuals involved in our operations are expected to act in accordance with security policies and to maintain an awareness of common threats and good practices.