SW-ISMS-POL-006
HR Security Policy
Version
1.0
Owner
CISO
Effective Date
TBD
Review Date
TBD
HR Security Policy
1. Purpose
This policy establishes security requirements for the complete employment lifecycle at Swedwise AB, from recruitment through termination. It ensures that personnel understand their security responsibilities, are appropriately screened, and that security considerations are integrated into HR processes.
This policy supports ISO 27001:2022 Annex A controls 6.1-6.8 (People controls) and protects Swedwise and customer information assets throughout the employee/contractor lifecycle.
2. Scope
This policy applies to:
Personnel Scope
- All employees (full-time, part-time, temporary)
- Contractors and consultants
- Interns and trainees
- Board members with access to Swedwise systems or information
- Third-party personnel working on behalf of Swedwise
Lifecycle Coverage
- Pre-employment screening and selection
- Onboarding and induction
- Ongoing employment terms and conditions
- Changes in role or access requirements
- Termination or change of employment
- Post-employment obligations
Location Coverage
- All Swedwise offices (Karlstad HQ, Stockholm, Uddevalla)
- Remote workers
- Consultants at customer sites
- Temporary or mobile work locations
3. Pre-Employment Screening
3.1 Background Verification
All candidates for employment or contractor engagement undergo screening appropriate to the role, including:
Standard Screening (All Roles):
- Identity verification (valid government-issued ID)
- Right to work verification (employment eligibility)
- Employment history verification (minimum 3 years or since last education)
- Educational qualification verification (for roles requiring specific degrees/certifications)
- Professional reference checks (minimum 2 references)
- Gap analysis in employment history (explanations for gaps >3 months)
Enhanced Screening (Sensitive Roles):
For roles with elevated security responsibilities (e.g., SaaS operations, CISO, system administrators, roles with access to customer confidential data), additional checks may include:
- Criminal background check (where legally permissible and proportionate)
- Credit check (for financially sensitive roles, with consent)
- Professional certification verification
- Previous employer security clearance verification (if applicable)
Contractor Screening:
- Standard screening applies to long-term contractors (>3 months engagement)
- Abbreviated verification for short-term contractors through reputable agencies
- Contractor company verification (business registration, insurance, references)
3.2 Screening Documentation
- All screening results are documented and retained in accordance with data protection requirements
- Screening must be completed before access to Swedwise systems or confidential information is granted
- Adverse findings are reviewed by HR and hiring manager; CISO consulted for security-sensitive roles
- Candidates are informed of screening requirements and consent obtained where required by law
3.3 Legal Compliance
All background screening complies with:
- Swedish Employment Protection Act (Lagen om anstรคllningsskydd - LAS)
- GDPR and Swedish data protection legislation
- Discrimination laws and ethical hiring practices
- Industry-specific regulations where applicable
Screening is proportionate to the role's security sensitivity and business need.
4. Terms and Conditions of Employment
4.1 Security Responsibilities in Employment Agreements
All employment contracts and contractor agreements include:
Confidentiality Obligations:
- Duty to protect Swedwise confidential and proprietary information
- Prohibition on unauthorized disclosure during and after employment
- Specific obligations regarding customer data and intellectual property
- Duration of confidentiality obligations (typically perpetual for trade secrets)
Acceptable Use:
- Acknowledgment of acceptable use policies for IT systems and information
- Prohibition on personal use of company resources except as permitted
- Restrictions on installation of software or unauthorized system modifications
Security Compliance:
- Requirement to comply with all information security policies and procedures
- Obligation to report security incidents and suspected violations
- Participation in mandatory security training and awareness programs
- Acceptance of monitoring and audit of system usage
Intellectual Property:
- Work product and inventions developed during employment belong to Swedwise
- Obligation to return all company property upon termination
- Non-compete and non-solicitation provisions (where legally enforceable)
Disciplinary Provisions:
- Consequences for security policy violations
- Right of Swedwise to investigate security incidents
- Termination provisions for serious security breaches
4.2 Non-Disclosure Agreements (NDAs)
Additional NDAs may be required for:
- Specific customer engagements with heightened confidentiality
- Access to particularly sensitive Swedwise information (e.g., M&A, strategic plans)
- Third-party personnel not directly employed by Swedwise
- Roles with access to trade secrets or proprietary technology
4.3 Code of Conduct
All personnel acknowledge and agree to follow Swedwise's Code of Conduct, which includes:
- Ethical behavior and integrity expectations
- Respect and professionalism in all interactions
- Prohibition on conflicts of interest
- Compliance with laws and regulations
- Reporting of unethical or illegal behavior
5. Security Awareness and Training
5.1 Onboarding Security Training
All new employees and contractors complete mandatory security awareness training within their first week, covering:
Core Topics:
- Information security policy overview and responsibilities
- Information classification and handling requirements
- Password security and authentication best practices
- Phishing and social engineering awareness
- Physical security and clean desk practices
- Incident reporting procedures
- Acceptable use of IT systems
- Data protection and privacy basics (GDPR awareness)
Format:
- Combination of online modules and in-person orientation
- Completion verified and recorded in HR system
- Assessment to verify understanding (minimum 80% passing score)
- Certificate of completion retained in personnel file
5.2 Ongoing Awareness
Annual Refresher Training:
- All staff complete annual security awareness refresher (minimum 30-45 minutes)
- Content updated to reflect current threats and organizational changes
- Completion tracked and reported to management
Role-Specific Training:
- System administrators, developers, SaaS operations: Advanced security training
- Customer-facing roles: Customer data handling and confidentiality
- Managers: Security responsibilities for their teams
- CISO, Quality Lead, Environmental Lead: Specialist IMS training
Awareness Communications:
- Regular security tips and reminders via email, intranet, team meetings
- Simulated phishing exercises (minimum quarterly)
- Security topic of the month program
- Lessons learned from incidents shared organization-wide
5.3 Training Records
- All security training completion is documented and retained for [TBD - e.g., 3 years] minimum
- Training status monitored and reported to management quarterly
- Non-completion escalated to line managers and may affect access privileges
6. During Employment
6.1 Access Control and Least Privilege
- Access to information and systems is granted based on job role requirements
- The principle of least privilege applies: minimum necessary access only
- Access requests are approved by line manager and system owner
- Access rights reviewed annually or when role changes
- Privileged access (admin rights) requires additional approval and justification
See SW-ISMS-POL-004 Access Control Policy for detailed requirements.
6.2 Monitoring and Acceptable Use
- Personnel acknowledge that their use of Swedwise systems may be monitored
- Monitoring is conducted in accordance with Swedish labor law and privacy requirements
- Personal use of systems is limited and subject to acceptable use policy
- Violations of acceptable use may result in disciplinary action
See SW-ISMS-POL-002 Acceptable Use Policy for detailed requirements.
6.3 Changes in Employment
When personnel change roles, locations, or responsibilities:
Access Reviews:
- Access rights reviewed and adjusted to match new role
- Access from previous role removed if no longer required
- Re-screening may be required if new role has higher security sensitivity
New Agreements:
- Updated employment contracts or addenda if responsibilities significantly change
- Additional NDAs if access to new confidential areas granted
- Re-acknowledgment of policies if substantial policy updates occurred
Training:
- Additional training provided for new security responsibilities
- Refresher training if moving to higher security sensitivity role
6.4 Departures and Extended Absences
Long-term Leave (>1 month):
- Access rights may be suspended during extended absence (with HR and manager approval)
- Equipment returned to office or secured appropriately
- Re-activation procedures defined for return to work
Sabbaticals/Unpaid Leave:
- Access typically suspended
- Equipment returned
- Confidentiality obligations remain in force
7. Termination or Change of Employment
7.1 Termination Process
Termination of employment (voluntary resignation, dismissal, retirement, end of contract) triggers immediate security procedures:
Access Revocation:
- System access disabled on effective termination date (or immediately for involuntary terminations with cause)
- Accounts deactivated (not deleted) to preserve audit trails
- Remote access (VPN, email, cloud services) revoked immediately
- Physical access cards/keys disabled
- Access to customer systems coordinated with customer security teams
Asset Return:
- All company property returned before final departure:
- Laptops, mobile devices, tablets
- Access cards, keys, security tokens
- Company credit cards
- Documents (paper and electronic media)
- Any other equipment or materials
- IT department verifies return and data removal from personal devices (BYOD)
- Unreturned assets reported and may be invoiced to departing employee
Data Removal:
- Personal data removed from company systems (BYOD devices)
- Company data deleted from personal devices (verification may be required)
- Departing employee certifies they have not retained unauthorized copies of Swedwise or customer information
7.2 Exit Interview and Reminders
Exit Interview:
- HR conducts exit interview covering security obligations
- Departing employee reminded of:
- Ongoing confidentiality obligations
- Prohibition on unauthorized use or disclosure of information
- Return of all company property
- Non-compete and non-solicitation obligations (if applicable)
- Contact for questions about post-employment obligations
Departure Checklist:
- Standardized checklist ensures all security steps completed
- Signed by departing employee, line manager, HR, and IT
- Retained in personnel file
7.3 Post-Employment Obligations
Confidentiality:
- Confidentiality obligations continue after termination (perpetual for trade secrets)
- Prohibition on using Swedwise confidential information for new employer's benefit
- Prohibition on soliciting Swedwise customers or employees (time-limited per contract)
Intellectual Property:
- Work product created during employment remains Swedwise property
- Obligation to assign any related inventions or IP that arise post-employment (if related to work performed)
Enforcement:
- Swedwise reserves right to enforce post-employment obligations
- Violations may result in legal action
7.4 Involuntary Termination for Cause
When termination is involuntary and related to security violations or misconduct:
Immediate Actions:
- Access revoked immediately (may occur before employee notification)
- Supervised exit from premises
- Remote wipe of mobile devices if not returned
- Investigation findings documented
- Law enforcement notification if criminal activity suspected
Customer Notification:
- Customers notified if terminated employee had access to their systems or data
- Coordination with customer security teams for access revocation
- Incident reporting if security breach involved
8. Contractors and Third-Party Personnel
8.1 Contractor Agreements
Contractors and third-party personnel with access to Swedwise information or systems are subject to:
- Contractual security obligations equivalent to employees
- Background screening appropriate to role and access
- Security awareness training before access granted
- Monitoring and compliance verification
- Termination procedures when engagement ends
8.2 Contractor Management
- Contractor security requirements included in procurement contracts
- Line manager responsible for contractor compliance
- Access limited to contract duration and scope
- Periodic review of contractor access (minimum annually)
- Termination procedures mirror employee process
8.3 Third-Party Personnel at Customer Sites
Swedwise consultants working at customer sites must:
- Comply with customer security policies and procedures
- Maintain Swedwise baseline security standards
- Report any conflicts between Swedwise and customer requirements to line manager
- Protect Swedwise confidential information while at customer locations
- Separate customer data from Swedwise data appropriately
9. Disciplinary Process
9.1 Policy Violations
Violations of this or related security policies are addressed through progressive discipline:
Minor Violations (First Occurrence):
- Verbal warning and coaching
- Retraining on relevant policy area
- Documented in personnel file
- Monitoring of compliance improvement
Repeat or Moderate Violations:
- Written warning
- Mandatory retraining and assessment
- Temporary access restrictions if appropriate
- Performance improvement plan
- Documented and retained in personnel file
Serious or Intentional Violations:
- Immediate access suspension pending investigation
- Formal investigation by HR and CISO
- Possible termination of employment
- Legal action if warranted (civil or criminal)
- Customer and authority notification if required
9.2 Investigation Process
Security incidents involving personnel follow documented investigation procedures:
- Prompt, fair, and confidential investigation
- Personnel rights respected (legal counsel, union representation where applicable)
- Evidence preserved and documented
- Findings documented with recommendations
- Consistent application of disciplinary standards
9.3 Whistleblower Protection
- Personnel reporting security violations in good faith are protected from retaliation
- Anonymous reporting channels available
- Reports investigated promptly and confidentially
- Protection aligned with Swedish whistleblower legislation
10. Roles and Responsibilities
HR Manager
Assigned to: [TBD - name]
Responsibilities:
- Coordinate pre-employment screening processes
- Ensure security terms included in employment contracts
- Maintain personnel security records
- Coordinate security training tracking
- Conduct exit interviews and termination processes
- Advise on employment law compliance
- Partner with CISO on security HR matters
CISO
Assigned to: [TBD - name]
Responsibilities:
- Define security requirements for roles and screening
- Approve enhanced screening for sensitive positions
- Develop and maintain security awareness training content
- Investigate security incidents involving personnel
- Provide input on disciplinary actions for security violations
- Monitor compliance with HR security policy
- Report HR security metrics to management
Line Managers
Responsibilities:
- Verify security training completion for their staff
- Request appropriate access rights (least privilege)
- Review staff access rights annually
- Report suspected security violations
- Support disciplinary processes
- Conduct departing employee handoff and asset return verification
- Ensure contractor compliance with security requirements
All Personnel
Responsibilities:
- Cooperate with background screening processes
- Complete mandatory security training on time
- Comply with all security policies and procedures
- Report security incidents and violations
- Protect confidential information during and after employment
- Return all company property upon termination
- Honor post-employment confidentiality and non-compete obligations
11. Records and Documentation
The following records are maintained:
Personnel Security Records:
- Background screening results ([TBD - retention period per local law])
- Security training completion records (minimum 3 years)
- Security acknowledgment forms (duration of employment + [TBD - e.g., 2 years])
- Access grant/revocation logs (minimum 12 months, or per audit requirement)
- Exit interview checklists (minimum 3 years)
- Disciplinary actions related to security (duration of employment + [TBD - e.g., 5 years])
Record Protection:
- Personnel security records classified as Confidential
- Access limited to HR, CISO, and authorized management
- Stored securely with access controls and encryption
- Retention and disposal per data protection requirements
12. Compliance and Legal Considerations
This policy complies with:
- GDPR: Background screening, training records, and monitoring comply with data protection principles
- Swedish Labor Law: Employment terms, disciplinary process, and monitoring respect worker rights
- Discrimination Laws: Screening and hiring practices are non-discriminatory
- Whistleblower Protections: Reporting channels and protections align with EU and Swedish legislation
- ISO 27001:2022: Annex A 6.1-6.8 people controls implemented
13. Review and Update
This policy is:
- Reviewed annually by CISO in coordination with HR Manager
- Updated when significant changes occur in:
- Organizational structure or roles
- Legal or regulatory requirements (employment law, data protection)
- Threat landscape or security incidents involving personnel
- ISO 27001 requirements
- Approved by [TBD - CEO/Management Team]
- Communicated to all staff following updates
14. Related Documents
Policies:
- SW-IMS-POL-001: Integrated Management System Policy
- SW-ISMS-POL-001: Information Security Policy
- SW-ISMS-POL-002: Acceptable Use Policy
- SW-ISMS-POL-003: Data Protection and Privacy Policy
- SW-ISMS-POL-004: Access Control Policy
- SW-ISMS-POL-007: Information Classification Policy
Procedures:
- [TBD - SW-ISMS-PRO-001: Access Control Procedure]
- [TBD - SW-ISMS-PRO-006: Security Incident Management Procedure]
- [TBD - SW-HR-PRO-001: Onboarding Procedure]
- [TBD - SW-HR-PRO-002: Offboarding Procedure]
Forms and Templates:
- [TBD - Security Awareness Training Certificate]
- [TBD - Employee Security Acknowledgment Form]
- [TBD - Exit Interview Checklist]
- [TBD - Access Request Form]
- [TBD - Contractor Security Agreement Template]
Supporting Documents:
- [TBD - Code of Conduct]
- [TBD - Security Awareness Training Materials]
15. Document Control
| Version | Date | Author | Changes | Approved By |
|---|---|---|---|---|
| 1.0 | [TBD] | [TBD - CISO name] | Initial policy creation | [TBD - CEO name] |
Next Review Date: [TBD - typically 12 months from effective date]
Document Classification: Internal
Document Owner: CISO
This policy is approved by Swedwise AB management and is effective from the date specified above. All staff are required to read, understand, and comply with this policy.