Information Security Policy
Our commitment to protecting the confidentiality, integrity, and availability of information assets entrusted to us by clients, insurers, and business partners.
Unison Insurance Broking Services Private Limited (“Unison” or “the Company”) is an IRDAI-licensed composite insurance broker committed to placing the security and privacy of client information at the core of its operations. This Information Security Policy (“Policy”) sets out the management framework, principles, and obligations that govern how Unison protects information assets across all its operations.
This Policy applies to:
- All employees, directors, officers, and contract staff of Unison Insurance Broking Services Pvt. Ltd.
- All third-party service providers, vendors, and technology partners who process, store, or transmit Unison’s or its clients’ information on the Company’s behalf
- All information systems, applications, infrastructure, and data repositories — whether on-premises, cloud-hosted, or hybrid — used to deliver Unison’s insurance broking services
- All physical offices, branch locations, and remote working environments where Unison’s information is accessed or processed
Regulatory context: Unison operates under the IRDAI (Insurance Brokers) Regulations 2018, the Information Technology Act 2000 and its amendments, the Digital Personal Data Protection (DPDP) Act 2023, and relevant CERT-In directions. This Policy has been designed to satisfy the information security and data governance expectations embedded in these frameworks.
Unison’s information security programme is anchored on the following core principles:
Confidentiality
Information is disclosed only to authorised individuals and entities with a legitimate business need to know.
Integrity
Information is accurate, complete, and protected from unauthorised modification or corruption throughout its lifecycle.
Availability
Systems and information remain accessible to authorised users when required, with minimal unplanned disruption.
Accountability
All actions on information systems are traceable to identifiable individuals through robust logging and audit mechanisms.
Compliance
All security practices meet or exceed applicable legal, regulatory, and contractual requirements including IRDAI and DPDP.
Continual Improvement
Security controls are regularly reviewed, tested, and improved in response to emerging threats and business changes.
All information handled by Unison is classified according to its sensitivity and the potential impact of unauthorised disclosure. The four-tier scheme below governs labelling, handling, storage, and disposal:
| Classification | Description | Examples | Handling requirement |
|---|---|---|---|
| RESTRICTED | Highest sensitivity; breach would cause severe regulatory, financial, or reputational harm | Policy terms, client health/financial data, underwriting decisions, credentials | Encrypted storage; strictly need-to-know access; no sharing outside Unison without NDA |
| CONFIDENTIAL | Sensitive business or personal information; breach would cause material harm | Client PII, claim details, premium records, HR data, contracts | Encrypted in transit; role-based access; not to be shared externally without authorisation |
| INTERNAL | Information for internal use only; limited impact if disclosed externally | Internal procedures, meeting notes, staff directories, project reports | Accessible to all staff; not to be published publicly without approval |
| PUBLIC | Information intended for or already available to the general public | Brochures, website content, published regulatory filings, press releases | No special restrictions; accuracy must be maintained before publication |
Access to information systems and data is governed by the principle of least privilege — users are granted only the minimum access required to perform their job functions.
- All access to Unison systems requires unique individual credentials; shared or generic accounts are prohibited except for supervised service accounts
- Multi-factor authentication (MFA) is mandatory for all remote access, email systems, cloud platforms, and privileged administrative accounts
- Access rights are reviewed quarterly by system owners and immediately upon role change, transfer, or departure of an employee
- Privileged access (administrator rights) is restricted, logged, and subject to enhanced monitoring at all times
- Session timeouts are enforced on all workstations and applications handling confidential or restricted data
- Physical access to server rooms, network equipment, and document archives is restricted to authorised personnel and logged via access control systems
Unison collects, processes, and stores personal data of policyholders, claimants, and employees in its capacity as an insurance intermediary. The Company is committed to protecting this data in accordance with the Digital Personal Data Protection (DPDP) Act 2023 and IRDAI guidelines.
- Personal data is collected only for specified, legitimate insurance-related purposes and is not processed beyond those purposes without the data principal’s consent
- All personal data is stored within India or in jurisdictions approved under applicable law; cross-border transfers require appropriate safeguards
- Data subjects (policyholders, claimants, employees) have the right to access, correct, and request erasure of their personal data, subject to legal retention obligations
- Personal data is retained only for as long as necessary for the purpose of collection or as required by IRDAI record-keeping norms (minimum 5 years for policy records)
- Hard copy documents containing personal data are stored in locked cabinets and disposed of by secure cross-cut shredding
- Electronic personal data at rest is encrypted using AES-256 or equivalent; data in transit uses TLS 1.2 or higher
- Privacy impact assessments are conducted before launching new data processing activities or systems
Notice to clients: Unison will never sell, rent, or trade your personal information to third parties for marketing purposes. Data shared with insurers and reinsurers is strictly for the purpose of placing, servicing, or renewing your insurance cover.
Unison implements defence-in-depth security architecture across its technology environment to prevent, detect, and respond to cyber threats.
- Perimeter firewalls, intrusion detection/prevention systems (IDS/IPS), and web application firewalls (WAF) protect all internet-facing systems
- Network segments are segregated by function (client-facing, internal, administrative, DMZ) to limit lateral movement in the event of a breach
- All endpoints are protected by enterprise-grade antivirus/anti-malware software with real-time scanning and automatic definition updates
- Vulnerability assessments are conducted quarterly; penetration tests by qualified third-party professionals are performed at least annually
- Security patches are applied within 30 days of release for standard vulnerabilities and within 72 hours for critical/zero-day vulnerabilities
- All system and security logs are retained for a minimum of 12 months and monitored via a Security Information and Event Management (SIEM) system
- Email is protected by anti-spam, anti-phishing, and DMARC/DKIM/SPF controls to prevent business email compromise
- USB and removable media usage on corporate systems is restricted and logged; data transfer to personal devices is prohibited
Unison maintains a formal Information Security Incident Management procedure to ensure that security incidents — including data breaches, system compromises, and service disruptions — are identified, contained, investigated, and reported in a timely and structured manner.
- All employees are required to report suspected security incidents immediately to the Information Security team via the designated incident reporting channel
- A documented Incident Response Plan (IRP) with defined roles, escalation paths, and response playbooks is maintained and tested annually
- Personal data breaches meeting the threshold under the DPDP Act 2023 will be reported to the Data Protection Board of India within the prescribed timelines
- Significant cyber incidents are reported to CERT-In within 6 hours of detection in accordance with the CERT-In Directions 2022
- IRDAI is notified of cyber incidents impacting the Company’s ability to service policyholders or compromising client data, as required under applicable guidelines
- Post-incident reviews are conducted for all major incidents to identify root causes, improve controls, and prevent recurrence
Report a security concern: Clients or third parties who believe their information may have been compromised in connection with Unison’s services should contact us immediately at security@unisoninsurance.net or call our helpdesk. All reports are treated with strict confidentiality.
Unison maintains a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) to ensure that critical insurance broking services — including policy issuance, claim support, and client communications — remain operational during and after a disruptive event.
- Critical systems and data are backed up daily with off-site or cloud replication; backup integrity is tested monthly
- Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) are defined for all critical systems and reviewed annually
- BCP/DRP exercises including tabletop simulations and partial failover tests are conducted at least once a year
- Alternative working arrangements (remote access, secondary offices) are documented and tested to maintain operational continuity during facility unavailability
Unison recognises that third-party relationships introduce supply-chain risk. All vendors, service providers, and business associates who access Unison’s systems or process client data are subject to rigorous security evaluation and contractual obligations.
- Security and privacy requirements are embedded in all vendor contracts via Data Processing Agreements (DPAs) and security annexures prior to engagement
- Vendors processing Restricted or Confidential information are assessed against a security questionnaire before onboarding and periodically thereafter
- Third-party access to Unison systems is time-limited, monitored, and revoked immediately upon contract expiry or termination
- Cloud service providers are evaluated for data residency, encryption standards, SOC 2 / ISO 27001 certification, and incident notification commitments
- Vendors must notify Unison within 24 hours of any security incident that may affect Unison’s data or systems
| Role | Key responsibilities |
|---|---|
| Board of Directors / CEO | Approve and champion this Policy; allocate adequate resources for information security; receive periodic security performance reports |
| CISO / Head – IT | Own and maintain this Policy; oversee security architecture, risk assessments, incident response, and regulatory reporting; drive the annual security review |
| Compliance Officer / DPO | Ensure alignment with IRDAI, DPDP, IT Act, and CERT-In requirements; manage data principal rights requests; oversee privacy impact assessments |
| IT / System Administrators | Implement and maintain technical controls; manage access provisioning; perform vulnerability patching; monitor security logs |
| All Employees | Comply with this Policy and all related procedures; complete mandatory security awareness training; report incidents and suspicious activity promptly |
| Vendors / Third Parties | Adhere to contractual security obligations; cooperate with Unison’s security assessments; promptly notify Unison of incidents affecting shared data or systems |
Compliance with this Policy is mandatory for all personnel within its scope. Unison takes policy violations seriously and will respond proportionately to the severity of the breach.
- Violations by employees may result in disciplinary action up to and including termination of employment, without prejudice to any civil or criminal liability arising from the breach
- Violations by third parties may result in contract suspension, termination, and recovery of damages as permitted by the applicable agreement
- Exceptions to this Policy must be formally documented, risk-assessed, and approved by the CISO; exceptions are time-limited and subject to compensating controls
- Compliance is monitored through internal audits, access reviews, security assessments, and SIEM alerts; findings are reported to senior management quarterly
Legal note: Deliberate or reckless misuse of information assets, unauthorised access, or concealment of a security incident may constitute offences under the IT Act 2000 and/or the DPDP Act 2023, attracting civil penalties and criminal prosecution.
This Policy is a living document. It is formally reviewed annually by the CISO and the Compliance team, or earlier in response to:
- Significant changes in the regulatory landscape (IRDAI guidelines, DPDP Rules, CERT-In directions)
- Material changes in Unison’s business model, technology environment, or risk profile
- Lessons learnt from security incidents, audit findings, or third-party assessments
- Emerging threats identified through threat intelligence monitoring
Approved revisions are communicated to all stakeholders within 30 days of sign-off. The most current version of this Policy is always available on the Unison Insurance website and the internal employee portal.
Authored by
CISO/DPO
Reviewed by
HR HEAD
Unison Insurance Broking Services Pvt. Ltd.
Approved by
CFO
Unison Insurance Broking Services Pvt. Ltd.