SlideShare a Scribd company logo
1 of 2
Download to read offline
casestudy
 SECUrIty




     Protecting information
     in an online learning
     environment




                    About Fronter
                    Fronter is the leading European provider of the Virtual Learning Environment, which is used by
                    millions of teachers and students at thousands of learning institutions around the world. This
                    success has been due to their strong emphasis on user involvement in development and their
                    approach to open technology standards.

                    Fronter is trusted by its customers, pupils and parents to protect personal information, and provide a
“The trust that     safe and secure environment for students and children. One of their largest deployments is for 170

customers place     schools with over 130,000 users and this service is managed by Logica.

in Fronter is key   WhAt Fronter needed
to our success      One of the biggest and growing concerns for Fronter’s customers today is electronic security. Fronter
and our growth.     chose Logica to be their expert security partner to identify and address the security risks in their

Logica’s security   business. Fronter also wanted to gain ISO/IEC 27001 certification, the international information
                    security management standard to prove that their online environment was secure. Through
credentials are     the experience of Logica’s security team, a high quality but easy-to-use security management

foremost in the     system was implemented. This impressed the auditors and helped Fronter achieve the ISO 27001
                    certification that gives their customers confidence.
market and this
reassures our       the chAllenge
customers that      Fronter had built its Virtual Learning Environment with over 100 web-based tools, to make the most
                    of the advantages of the digital world and provide teachers and students with a powerful, convenient
our security has    online environment. This allows teachers to customise learning and assessment, while learners get
been designed to    their own personal learning environment.

the very highest    It was very important to Fronter that, with the rising threat of electronic infiltration, their organisation,
standards.”         supply chain and products were secure and that they protected the personal information of their
                    customers.

roger Larsen,       They also wanted to prove to their current users and prospective customers that they could be
CEO, Fronter        trusted with the security of their online information. Fronter requested that Logica helped them gain
                    formal certification to ISO/IEC 27001 and compliance to the EU Data Protection Directive and other
                    relevant regulations such as the UK Government Data Handling rules.
our AnsWer
                             Working with Fronter, our team of security experts analysed the information they held, in terms of
Key benefits
                             what was used to run the company and what was entrusted to them by their customers. Using our
• The virtual learning       own risk analysis method, IrIS, we identified the potential risks the information could be exposed to,
                             both physical and from electronic channels. This allowed us to set in place recommended policies,
  environment is safe
                             processes and education to control these risks, building upon their current security foundations.
  and secure for their
  customers                  We brought an in-depth understanding of the personal privacy laws in Europe, including the
                             requirements mandated by the UK Government, for handling personal information. Protecting
• the first                  information relating to children was vital to the success of this project and the relevant personal
  Pan-European               privacy laws were strictly followed.
  Managed Learning
                             The Logica team ensured that the Fronter solution was compliant with both the spirit and the
  Environment provider       letter of the UK Data Protection Act by having detailed discussions with the UK Information
  to achieve ISO 27001       Commissioner.
  certification
                             The resulting information security management system we created enhanced their current security
• In a stronger position     practices, and supported them in a more secure and traceable set of processes. Getting their
                             suppliers to follow these processes as well gave even greater protection of sensitive information.
  to win new customers
                             We also created operating procedures, to allow security processes to be undertaken in a consistent
  and increase               and auditable manner, and developed the initial business continuity plan for the Oslo operation.
  revenues in new
  market areas               A success story

• The online personal        The success of this programme is due to the determination of Fronter to implement a robust
                             approach to protecting data and the expertise of Logica’s staff to build security best practices into
  information of             an easy to use, effective and ISO 27001 compliant information security management system.
  students and children
                             Good security practices are now engrained in the DNA of Fronter. the whole business is affected,
  is secured
                             from physical and personnel controls, through to supplier management, systems development and
                             maintenance, and the delivery of the managed service. The result delivers an assurance to all of
                             Fronter’s eight million customers that their personal information is secure, and that their students
                             and children can learn in a safe online environment.

                             By gaining accreditation to ISO/IEC 27001 Fronter provides new customers the assurance that
                             they are a trusted supplier allowing growth in new market areas. Securing the online world is a
                             challenge many organisations face, Fronter have proven it can be achieved cost-effectively and
                             deliver considerable business benefits.




                             Logica is a business and technology service company, employing 39,000 people. It provides business consulting, systems integration
                             and outsourcing to clients around the world, including many of Europe’s largest businesses. Logica creates value for clients by
                             successfully integrating people, business and technology. It is committed to long term collaboration, applying insight to create innovative
                             answers to clients’ business needs. Logica is listed on both the London Stock Exchange and Euronext (Amsterdam) (LSE: LOG; Euronext:
                             LOG). More information is available at www.logica.com
 logica
 tel: +44 (0) 207 637 9111
                             AUStrALIA / BELGIUM / BrAZIL / CANADA / CZECH rEPUBLIC / DENMArK / EGyPt / EStONIA / FINLAND / FrANCE
 security@logica.com         GErMANy / HONG KONG / HUNGAry / INDIA / INDONESIA / KUWAIt / LUXEMBOUrG / MALAySIA / MOrOCCO
                             NEtHErLANDS / NOrWAy / PHILIPPINES / POLAND / POrtUGAL / rUSSIA / SAUDI ArABIA / SINGAPOrE / SLOVAKIA
 www.logica.com              SPAIN / SWEDEN / SWItZErLAND / tAIWAN / UKrAINE / UNItED ArAB EMIrAtES / UK / USA

 CODE 022 0310

More Related Content

Similar to A case study on Protecting information in an online learning environment

Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During CommunicationPECB
 
Primero Project Brief April 2015_v2
Primero Project Brief April 2015_v2Primero Project Brief April 2015_v2
Primero Project Brief April 2015_v2Robert MacTavish
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity SMKCreations
 
ScienceSoft Corporate Profile
ScienceSoft Corporate ProfileScienceSoft Corporate Profile
ScienceSoft Corporate ProfileSergei Rabotai
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentationrichard_turner
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxcaniceconsulting
 
The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2E-MIT Solutions
 
Cyber security conference 2016 - OpenSphere Overview
Cyber security conference 2016 - OpenSphere OverviewCyber security conference 2016 - OpenSphere Overview
Cyber security conference 2016 - OpenSphere OverviewDannisen Chellen
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India
 
cloud-security
cloud-securitycloud-security
cloud-securityAsun Sada
 
Octree securapro mauleverer case study
Octree securapro mauleverer case studyOctree securapro mauleverer case study
Octree securapro mauleverer case studyTony Richardson CISSP
 
Legal Point of View
Legal Point of ViewLegal Point of View
Legal Point of ViewLeila Kim
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specificationsSsendiSamuel
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know Sarah Crabb
 

Similar to A case study on Protecting information in an online learning environment (20)

CV 2.4 18/06/2016
CV 2.4 18/06/2016CV 2.4 18/06/2016
CV 2.4 18/06/2016
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During Communication
 
Primero Project Brief April 2015_v2
Primero Project Brief April 2015_v2Primero Project Brief April 2015_v2
Primero Project Brief April 2015_v2
 
Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
ScienceSoft Corporate Profile
ScienceSoft Corporate ProfileScienceSoft Corporate Profile
ScienceSoft Corporate Profile
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
 
The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2
 
Cyber security conference 2016 - OpenSphere Overview
Cyber security conference 2016 - OpenSphere OverviewCyber security conference 2016 - OpenSphere Overview
Cyber security conference 2016 - OpenSphere Overview
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
cloud-security
cloud-securitycloud-security
cloud-security
 
Octree securapro mauleverer case study
Octree securapro mauleverer case studyOctree securapro mauleverer case study
Octree securapro mauleverer case study
 
Legal Point of View
Legal Point of ViewLegal Point of View
Legal Point of View
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

A case study on Protecting information in an online learning environment

  • 1. casestudy SECUrIty Protecting information in an online learning environment About Fronter Fronter is the leading European provider of the Virtual Learning Environment, which is used by millions of teachers and students at thousands of learning institutions around the world. This success has been due to their strong emphasis on user involvement in development and their approach to open technology standards. Fronter is trusted by its customers, pupils and parents to protect personal information, and provide a “The trust that safe and secure environment for students and children. One of their largest deployments is for 170 customers place schools with over 130,000 users and this service is managed by Logica. in Fronter is key WhAt Fronter needed to our success One of the biggest and growing concerns for Fronter’s customers today is electronic security. Fronter and our growth. chose Logica to be their expert security partner to identify and address the security risks in their Logica’s security business. Fronter also wanted to gain ISO/IEC 27001 certification, the international information security management standard to prove that their online environment was secure. Through credentials are the experience of Logica’s security team, a high quality but easy-to-use security management foremost in the system was implemented. This impressed the auditors and helped Fronter achieve the ISO 27001 certification that gives their customers confidence. market and this reassures our the chAllenge customers that Fronter had built its Virtual Learning Environment with over 100 web-based tools, to make the most of the advantages of the digital world and provide teachers and students with a powerful, convenient our security has online environment. This allows teachers to customise learning and assessment, while learners get been designed to their own personal learning environment. the very highest It was very important to Fronter that, with the rising threat of electronic infiltration, their organisation, standards.” supply chain and products were secure and that they protected the personal information of their customers. roger Larsen, They also wanted to prove to their current users and prospective customers that they could be CEO, Fronter trusted with the security of their online information. Fronter requested that Logica helped them gain formal certification to ISO/IEC 27001 and compliance to the EU Data Protection Directive and other relevant regulations such as the UK Government Data Handling rules.
  • 2. our AnsWer Working with Fronter, our team of security experts analysed the information they held, in terms of Key benefits what was used to run the company and what was entrusted to them by their customers. Using our • The virtual learning own risk analysis method, IrIS, we identified the potential risks the information could be exposed to, both physical and from electronic channels. This allowed us to set in place recommended policies, environment is safe processes and education to control these risks, building upon their current security foundations. and secure for their customers We brought an in-depth understanding of the personal privacy laws in Europe, including the requirements mandated by the UK Government, for handling personal information. Protecting • the first information relating to children was vital to the success of this project and the relevant personal Pan-European privacy laws were strictly followed. Managed Learning The Logica team ensured that the Fronter solution was compliant with both the spirit and the Environment provider letter of the UK Data Protection Act by having detailed discussions with the UK Information to achieve ISO 27001 Commissioner. certification The resulting information security management system we created enhanced their current security • In a stronger position practices, and supported them in a more secure and traceable set of processes. Getting their suppliers to follow these processes as well gave even greater protection of sensitive information. to win new customers We also created operating procedures, to allow security processes to be undertaken in a consistent and increase and auditable manner, and developed the initial business continuity plan for the Oslo operation. revenues in new market areas A success story • The online personal The success of this programme is due to the determination of Fronter to implement a robust approach to protecting data and the expertise of Logica’s staff to build security best practices into information of an easy to use, effective and ISO 27001 compliant information security management system. students and children Good security practices are now engrained in the DNA of Fronter. the whole business is affected, is secured from physical and personnel controls, through to supplier management, systems development and maintenance, and the delivery of the managed service. The result delivers an assurance to all of Fronter’s eight million customers that their personal information is secure, and that their students and children can learn in a safe online environment. By gaining accreditation to ISO/IEC 27001 Fronter provides new customers the assurance that they are a trusted supplier allowing growth in new market areas. Securing the online world is a challenge many organisations face, Fronter have proven it can be achieved cost-effectively and deliver considerable business benefits. Logica is a business and technology service company, employing 39,000 people. It provides business consulting, systems integration and outsourcing to clients around the world, including many of Europe’s largest businesses. Logica creates value for clients by successfully integrating people, business and technology. It is committed to long term collaboration, applying insight to create innovative answers to clients’ business needs. Logica is listed on both the London Stock Exchange and Euronext (Amsterdam) (LSE: LOG; Euronext: LOG). More information is available at www.logica.com logica tel: +44 (0) 207 637 9111 AUStrALIA / BELGIUM / BrAZIL / CANADA / CZECH rEPUBLIC / DENMArK / EGyPt / EStONIA / FINLAND / FrANCE security@logica.com GErMANy / HONG KONG / HUNGAry / INDIA / INDONESIA / KUWAIt / LUXEMBOUrG / MALAySIA / MOrOCCO NEtHErLANDS / NOrWAy / PHILIPPINES / POLAND / POrtUGAL / rUSSIA / SAUDI ArABIA / SINGAPOrE / SLOVAKIA www.logica.com SPAIN / SWEDEN / SWItZErLAND / tAIWAN / UKrAINE / UNItED ArAB EMIrAtES / UK / USA CODE 022 0310