Rolf Berryman Logo


Send Your CV
Have a vacancy to fill?


This document sets out the measures to be taken by all employees of Rolf Berryman (the “Company”) and by the Company as a whole in order to protect the Company’s computer systems, devices, infrastructure, computing environment and any and all other relevant equipment (collectively, “IT Systems”) from damage and threats whether internal, external, deliberate or accidental.


Key Principles

  • All IT Systems are to be protected against unauthorised access.
  • All IT Systems are to be used only in compliance with relevant Company Policies.
  • All data stored on IT Systems are to be managed securely in compliance with all relevant parts of the Data Protection Act 1998 and all other laws governing data protection whether now or in the future in force.
  • All employees of the Company and any and all third parties authorised to use the IT Systems including, but not limited to, contractors and sub-contractors (collectively, “Users”), must ensure that they are familiar with this Policy and must adhere to and comply with it at all times.
  • All line managers must ensure that all Users under their control and direction must adhere to and comply with this Policy at all times as required under paragraph 2.4.
  • All IT Systems are to be installed, maintained, serviced, repaired and upgraded by Gareth Lautenberg (the “IT Department”) or by such third party/parties as the IT Department may from time to time authorise.
  • The responsibility for the security and integrity of all IT Systems and the data stored thereon (including, but not limited to, the security, integrity and confidentiality of that data) lies with the IT Department unless expressly stated otherwise.
  • All breaches of security pertaining to the IT Systems or any data stored thereon shall be reported and subsequently investigated by the IT Department.
  • All Users must report any and all security concerns relating to the IT Systems or to the data stored thereon immediately to the IT Department.


IT Department Responsibilities

 The IT Manager, Gareth Lautenberg, shall be responsible for the following:

  • ensuring that all IT Systems are assessed and deemed suitable for compliance with the Company’s security requirements;
  • ensuring that IT security standards within the Company are effectively implemented and regularly reviewed; and
  • ensuring that all Users are kept aware of the requirements of this Policy and of all related legislation, regulations and other relevant rules whether now or in the future in force including, but not limited to, the Data Protection Act 1998 and the Computer Misuse Act 1990.

The IT Staff shall be responsible for the following:

  • assisting all Users in understanding and complying with this Policy;
  • providing all Users with appropriate support and training in IT security matters and use of IT Systems;
  • ensuring that all Users are granted levels of access to IT Systems that are appropriate for each User, taking into account their job role, responsibilities and any special security requirements;
  • receiving and handling all reports relating to IT security matters and taking appropriate action in response;
  • taking proactive action, where possible, to establish and implement IT security procedures and raise User awareness;
  • assisting the IT Manager in monitoring all IT security within the Company and taking all necessary action to implement this Policy and any changes made to this Policy in the future; and
  • ensuring that regular backups are taken of all data stored within the IT Systems at intervals no less than monthly and that such backups are stored at a suitable location off the Company premises.


Users’ Responsibilities:

  • All Users must comply with all relevant parts of this Policy at all times when using the IT Systems.
  • All Users must use the IT Systems only within the bounds of UK law and must not use the IT Systems for any purpose or activity which is likely to contravene any UK law whether now or in the future in force.
  • Users must immediately inform the IT Department of any and all security concerns relating to the IT Systems.
  • Users must immediately inform the IT Department of any other technical problems (including, but not limited to, hardware failures and software errors) which may occur on the IT Systems.
  • Any and all deliberate or negligent breaches of this Policy by Users will be handled as appropriate under the Company’s disciplinary procedures.


Software Security Measures

  • All software in use on the IT Systems (including, but not limited to, operating systems and individual software applications) will be kept up-to-date and any and all relevant software updates, patches, fixes and other intermediate releases will be applied at the sole discretion of the IT Department.  This provision does not extend to upgrading software to new ‘major releases’ (e.g. from version 1.0 to version 2.0), only to updates within a particular major release (e.g. from version 1.0 to version 1.0.1 etc.).  Unless a software update is available free of charge it will be classed as a major release and thus falls within the remit of new software procurement and outside the scope of this provision.
  • Where any security flaw is identified in any software that flaw will be either fixed immediately or the software may be withdrawn from the IT Systems until such time as the security flaw can be effectively remedied.
  • No Users may install any software of their own, whether that software is supplied on physical media (e.g. DVD-Rom) or whether it is downloaded, without the approval of the IT Manager.  Any software belonging to Users must be approved by the IT Manager and may only be installed where that installation poses no security risk to the IT Systems and where the installation would not breach any licence agreements to which that software may be subject.
  • All software will be installed onto the IT Systems by the IT Department unless an individual User is given written permission to do so by the IT Manager.  Such written permission must clearly state which software may be installed and onto which computer(s) or device(s) it may be installed.


Anti-Virus Security Measures:

  • Most IT Systems (including all computers and servers) will be protected with suitable anti-virus, firewall and internet security software.  All such anti-virus, firewall and internet security software will be kept up-to-date with the latest software updates and definitions.
  • All IT Systems protected by anti-virus software will be subject to a full system scan at least annually.
  • All storage media (e.g. USB memory sticks or disks of any kind) used by Users for transferring files must be virus-scanned before any files may be transferred.  Such virus scans shall be performed automatically upon connection.
  • Users shall not be permitted to transfer files using cloud storage systems.
  • Any files being sent to third parties outside the Company, whether by email, on physical media or by other means (e.g. FTP or shared cloud storage) must be scanned for viruses before being sent or as part of the sending process, as appropriate. 
  • Where any virus is detected by a User this must be reported immediately to the IT Department (this rule shall apply even where the anti-virus software automatically fixes the problem).  The IT Department shall promptly take any and all necessary action to remedy the problem.  In limited circumstances this may involve the temporary removal of the affected computer or device.  Wherever possible a suitable replacement computer or device will be provided immediately to limit disruption to the User.
  • Where any User deliberately introduces any malicious software or virus to the IT Systems this will constitute a criminal offence under the Computer Misuse Act 1990 and will be handled as appropriate under the Company’s disciplinary procedures.


Hardware Security Measures:

  • Wherever practical, IT Systems will be located in rooms which may be securely locked when not in use or, in appropriate cases, at all times whether in use or not (with authorised Users being granted access by means of a key, smart card, door code or similar).  Where access to such locations is restricted, Users must not allow any unauthorised individual access to such locations for any reason.
  • All IT Systems not intended for normal use by Users (including, but not limited to, servers, networking equipment and network infrastructure) shall be located, wherever possible and practical, in secured, climate-controlled rooms and/or in locked cabinets which may be accessed only by designated members of the IT Department.
  • No Users shall have access to any IT Systems not intended for normal use by Users (including such devices mentioned above) without the express permission of the IT Manager.  Under normal circumstances whenever a problem with such IT Systems is identified by a User, that problem must be reported to the IT Department.  Under no circumstances should a User attempt to rectify any such problems without the express permission (and, in most cases, instruction and/or supervision) of the IT Manager.
  • All non-mobile devices (including, but not limited to, desktop computers, workstations and monitors) shall, wherever possible and practical, be physically secured in place with a suitable locking mechanism.  Where the design of the hardware allows, computer cases shall be locked to prevent tampering with or theft of internal components.
  • All mobile devices (including, but not limited to, laptops, netbooks, tablets, PDAs and mobile telephones) provided by the Company should always be transported securely and handled with care.  In circumstances where such mobile devices are to be left unattended they should be placed inside a lockable case or other suitable container.  Users should make all reasonable efforts to avoid such mobile devices from being left unattended at any location other than their private homes or Company premises.  If any such mobile device is to be left in a vehicle it must be stored out of sight.
  • The IT Department shall maintain a complete asset register of all IT Systems.  All IT Systems shall be labelled and the corresponding data shall be kept on the asset register.


Access Security:

  • All IT Systems (and in particular mobile devices including, but not limited to, laptops, netbooks, tablets, PDAs and mobile telephones) shall be protected with a secure password or such other form of secure log-in system as the IT Department may deem appropriate.  Such alternative forms of secure log-in may include fingerprint identification and facial recognition.
  • All passwords must, where the software, computer or device allows:
    • be at least six characters long;
    • contain a combination of one upper case, one number and one symbol;
    • be changed at least every 45 days;
    • be different from the previous password;
    • not be obvious or easily guessed (e.g. birthdays or other memorable dates, memorable names, events or places etc.); and
    • be created by individual Users.
  • Passwords should be kept secret by each User.  Under no circumstances should a User share their password with anyone including the IT Manager and the IT Staff.  No User will be legitimately asked for their password by anyone at any time and any such request should be refused.  If a User has reason to believe that another individual has obtained their password they should change their password immediately [and report the suspected breach of security to the IT Department].
  • If a User forgets their password, this should be reported to the IT Department.  The IT Department will take the necessary steps to restore the User’s access to the IT Systems which may include the issuing of a temporary password which may be fully or partially known to the member of the IT Staff responsible for resolving the issue.  A new password must be set up by the User immediately upon the restoration of access to the IT Systems.
  • If set up by the company, all IT Systems with displays and user input devices (e.g. mouse, keyboard, touchscreen etc.) shall be protected, where possible, with a password protected screensaver that will activate after a given period of inactivity.  This time period cannot be changed by Users and Users may not disable the screensaver.  Activation of the screensaver will not interrupt or disrupt any other activities taking place on the computer (e.g. data processing).
  • Users may not use any software which may allow outside parties to access the IT Systems without the express consent of the IT Manager.  Any such software must be reasonably required by the User for the performance of their job role and must be fully inspected and cleared by the IT Manager.
  • Users may connect their own devices (including, but not limited to, mobile telephones, tablets and laptops) to the Company network subject to the approval of the IT Department.  Any and all instructions and requirements provided by the IT Department governing the use of Users’ own devices when connected to the Company network must be followed at all times.  Users’ use of their own devices shall be subject to, and governed by, all relevant Company Policies (including, but not limited to, this Policy) while those devices are connected to the Company network or to any other part of the IT Systems.  The IT Department shall reserve the right to request the immediate disconnection of any such devices without notice.


Data Protection:

  • All personal data (as defined in the Data Protection Act 1998) collected, held and processed by the Company will be collected, held and processed strictly in accordance with the eight Data Protection Principles of the Data Protection Act 1998, the provisions of the Data Protection Act 1998 and the Company’s Data Protection Policy.
  • All Users handling data for and on behalf of the Company shall be subject to, and must comply with, the provisions of the Company’s Data Protection Policy.


Internet and Email Use:

  • All Users shall be subject to, and must comply with, the provisions of the Company’s Communications, Email and Internet Policy when using the IT Systems.
  • Where provisions in this Policy require any additional steps to be taken to ensure IT security when using the internet or email over and above the requirements imposed by the Communications, Email and Internet Policy, Users must take such steps as required.


Reporting IT Security Breaches:

  • All concerns, questions, suspected breaches or known breaches shall be referred immediately to Gareth Lautenberg.
  • Upon receiving a question or notification of a breach, the IT Department shall, within 24hours assess the issue including, but not limited to, the level of risk associated therewith, and shall take any and all such steps as the IT Department deems necessary to respond to the issue.
  • Under no circumstances should a User attempt to resolve an IT security breach on their own without first consulting the IT Department.  Users may only attempt to resolve IT security breaches under the instruction of, and with the express permission of, the IT Department.
  • All IT security breaches, whether remedied by the IT Department or by a User under the IT Department’s direction, shall be fully documented.


Implementation of Policy:

  • This Policy shall be deemed effective as of 25th May 2018.  No part of this Policy shall have retroactive effect and shall thus apply only to matters occurring on or after this date.


This Policy has been approved and authorised by:

Name: Gareth Lautenberg

Position: Partner

Date: 4th May 2018

What People Say

Have a look at what our clients have to say, they were sitting right where you are now before we helped them.

    • As a job applicant, I found this process to be more straightforward (and less stressful) than I could have possibly anticipated. Peter was supportive from the outset. He helped me to put my best foot forward throughout the process, and was always on-hand to offer any assistance and answer any questions (I was never made to feel like a bother). I felt that Peter took the time to understand my experience, needs and goals. As such, he was confident that I would be well-matched to the role itself, as well as the team. I am now very happily placed in my new role and appreciate all Peter has done to facilitate this successful outcome!

      Solicitor 03 Apr 2020
    • “Lorna at Rolf Berryman has passed my expectations as a recruitment consultant. She kept in regular contact with me and listened with care and professionalism as to my needs for a role right for me. She used her array of contacts to get me multiple interviews quickly and even managed to convince a partner at a law firm I wanted to work for to create a role when one was not advertised. I would not hesitate to recommend her or Rolf Berryman to anyone wanting positive results in a career change”

      Associate Solicitor Litigation 22 Aug 2017
    • Toby recruited me for my current position which has allowed my career to grow in a positive direction and rewarded me with a range of new skills. I can wholeheartedly recommend him as a recruiter who not only gets the job done, but keeps in contact after this process has been completed. He is approachable, knowledgeable about his market, and above all has integrity - a valuable commodity that some recruiters overlook.

      Digital Forensic Investigator 25 Aug 2017
    • Peter is very proactive but also attuned to individual clients' needs and preferences. I found he worked hard (and very effectively) to find suitable options without ever trying to 'hard sell' inappropriate ones - which really set him apart

      Lawyer 01 Mar 2018
    • Sarah really helped me and assured me and answered all of my questions and was very polite. I was unsure about the job but she assured me and I went for it and now I think I am going to love my new job all thanks to Sarah and Rolf Berryman. Thank you for your help and support.

      CSA Sussex 01 Nov 2018
    • “Although I wasn't actively looking for a new role, I was and am so pleased that Peter got in touch. I found he listened carefully when I was explaining my experience and has placed me perfectly in my new role. I know that the market for junior lawyers is competitive and difficult but I feel Peter prepped me well for my interview and was very knowledgeable about the Firm and their requirements, which allowed me to prepare and feel relaxed. Would definitely recommend him!”

      Commercial Property Solicitor 20 Nov 2018

Contact Us

Let us know what you’re looking for and how we can help you.

rolf berryman

A recruitment business that thrives on understanding our clients’ recruitment needs when they are looking to recruit and finding candidates their perfect role.

Our personal and driven approach allows us to get a genuine understanding of who we work with to ensure we provide a quality recruitment solution. This is why our clients and candidates choose to work with us time after time.