ISO 27001 Information Transfer Policy
In this guide, you will learn what an ISO 27001 Information Transfer Policy is, how to write it yourself and I give you a template you can download and use right away.
Table of contents
What is an ISO 27001 Information Transfer Policy?
The ISO 27001 Network Security Management Policy sets out how you manage the transfer of information across different media to protect the confidentiality, integrity and availability of data.
It is one of theย ISO 27001 policiesย required by theย ISO 27001ย standard forย ISO 27001 certification.

How to write an ISO 27001 Information Transfer Policy
Time needed: 1 hour and 30 minutes
How to write an ISO 27001 Information Transfer Policy
- Create your version control and document mark-up
ISO 27001 documents require version control of the author, the change, the date and the version as well as document mark up such as document classification.
- Write the ISO 27001 Information Transfer Policy contents page
Document Version Control
Document Contents Page
Information Transfer Policy
Purpose
Scope
Principles
Information Virus Checking
Information Encryption
Data Transfer Methods
Preferred Transfer Method
Data Transfer by Email
Data transfers by post/courier
Data transfers on removable media / memory sticks
Telephones, Mobile Phones and General Conversations
Data Transfers over Bluetooth
Lost or missing information
Policy Compliance
Compliance Measurement
Exceptions
Non-Compliance
Continual Improvement
Areas of the ISO27001 Standard Addressed - Write the ISO 27001 Information Transfer Policy purpose
The purpose of this policy is ensuring that correct treatment when transferring information internally and externally to the company and to protect the transfer of information using all types of communication facilities.
- Write the ISO 27001 Information Transfer Policy principle
Data transfer must comply with all legal and regulation legislation requirements including but not limited to the GDPR and Data Protection Act 2018.
Formal agreements that include non-disclosure and confidentially clauses must be in place for data sharing prior to the data transfer.
Personal data must not be transferred outside the European Economic Area without legal consent, justification, and legal mechanisms in place.
No personal or confidential information is to be transferred unencrypted.
All transfers are in line with the Information Classification and Handling Policy - Write the ISO 27001 Information Transfer Policy scope
All employees and third-party users.
Information that forms part of systems and applications deemed in scope by the ISO 27001 scope statement. - Explain information virus checking
Information that is transferred is virus checked before being sent or before being opened when received.
- Describe information encryption
Personal and confidential information is always encrypted before being transferred.
Encryption credentials for username and password where used are shared via two separate and distinct communication methods. The preferred method is to share the username via email and the password via a voice call. - Set out the data transfer methods and controls
Preferred Transfer Method
The preferred transfer method is (- describe how we transfer data based on DropBox, Sharefile, Google Drive, One Drive, Company portal).
Data Transfer by Email
Email is never the best solution for transferring information as it is not secure and is not a guaranteed delivery mechanism.
Consideration is always given to an alternative secure method of transferring sensitive data wherever possible and practicable.
Email communication should not be used to transfer unencrypted personal or confidential information.
Email messages must contain clear instructions of the recipientโs responsibilities and instructions on what to do if they are not the correct recipient.
Care must be taken as to what information is placed in the subject line of the email or in the accompanying message. Filename or subject line must not reveal the full contents of attachments or disclose any sensitive personal data.
The use of a personal email account is not permitted.
Data transfers by post/courier
Data transfers which occur via physical media such as paper reports, memory cards or CDs must only be dispatched via the company approved secure courier with a record of collection and a signature obtained upon delivery. The use of Royal Mail first class, second class, special delivery or recorded delivery is not permitted.
The recipient should be clearly stated on the parcel and the physical media must be securely packaged so that it does not break or crack.
The recipient should be advised in advance that the information is being sent so that they are aware when to expect the information. The recipient must confirm safe receipt as soon as the information arrives. The sender responsible for sending the data is responsible for confirming the data has arrived safely.
Data transfers on removable media / memory sticks
Only company owned removable media is to be used for transferring information in line with policy the device usage is approved, recorded in the asset register, assigned, and encrypted.
The removable media must be returned to the owner on completion of the transfer and the transferred data must be securely erased from the storage device after use. The asset register must be updated.
Clear instructions of the recipientโs responsibilities and instructions on what to do if they are not the intended recipient must be given.
Any accompanying message or filename must not reveal the contents of the media.
The process described for Data transfers by post / courier must be followed.
Telephones, Mobile Phones and General Conversations
As phone calls may be monitored, overheard, or intercepted (either deliberately or accidentally), care must be taken as follows:
Be conscious of your surroundings especially on public transport such as trains and public places such as coffee shops when discussing personal, confidential, or otherwise sensitive information.
Personal data must not be transferred or discussed over the telephone unless you have confirmed the identity and authorisation of the recipient.
When using answer phones do not leave sensitive or confidential messages or include any personal data. Only provide a means of contact and wait for the recipient to speak to you personally.
When listening to answer phone messages left for yourself, ensure you do not play them in open plan areas which risks others overhearing. Delete them immediately after listening.
Data Transfers over Bluetooth
Bluetooth is not approved as a communication method for unencrypted confidential, personal, or otherwise sensitive data.
Ensure device mutual authentication is performed for all accesses.
Enable encryption for all broadcast transmissions (Encryption Mode 3).
Configure encryption key sizes to the maximum allowable.
Establish a โminimum key size for any key negotiation process. Keys should be at least 128 bits long
For Bluetooth: Use application-level (on top of the Bluetooth stack) authentication and encryption for sensitive data communication such as SSL.
Perform pairing as infrequently as possible, ideally in a secure area where attackers cannot realistically observe the passkey entry and intercept Bluetooth pairing messages.
Note: A โsecure areaโ is defined as a non-public area that is indoors away from windows in locations with physical access controls.
Users should not respond to any messages requesting a PIN, unless the user has initiated a pairing and is certain the PIN request is being sent by one of the users โs devices.
Use only Security Mode 3 and 4. Modes 1 and 2 should not be allowed. Security Mode 3 is preferred but v.2.1 devices cannot use Security Mode 3.
Users should not accept transmissions of any kind from unknown or suspicious devices. These types of transmissions include messages, files, or images.
All Bluetooth profiles except for Serial Port Profile should be always disabled, and the user should not be able to enable them. - Describe the process for lost or missing information
If it is discovered or suspected that information has been lost, is missing, did not arrive, or has gone to the wrong person then the employee or external party user is required to inform at least one of their line manager, the information security management team, the management review team, or the senior management team immediately at which point the company Incident Management Process will be followed.
ISO 27001 Information Transfer Policy Template
Theย ISO 27001 Information Transfer Policy Templateย is designed to fast track your implementation and give you an exclusive, industry best practice policy template that is pre written and ready to go. It is included in theย ISO 27001 toolkit.
ISO 27001 Information Transfer Policy Example
An example ISO 27001 Information Transfer Policy: