« Home / Information Security Policy
Collect the existence of the Information Security Policies that will provide the indications for the management and support of information security, in accordance with the business requirements of the entity, with the applicable legislation and regulations, in addition to establishing the scope of the ISMS.
This procedure will be applied to all personnel involved in the development, implementation, and maintenance of the Information Security Management System.
It is the responsibility of the Company’s Management to establish the Information Security goals to guarantee a controlled environment, both for the company and to maintain what has been agreed with its clients, thus assuming its corporate responsibility.
It is the responsibility of the Information Security Management Committee to review the Information Security Policies once a year, with the person in charge of the ISMS who will control that the review is carried out.
Information Security Users will be responsible for assuming and complying with the Security Policies.
To implement an ISMS in practice it is necessary to:
Information security is understood as the set of preventive and reactive measures that make it possible to safeguard and protect information. In other words, they are all those use policies and measures that affect the treatment of the data used in an organization.
The information security objectives are the needs that the organization intends to satisfy, to ensure the integrity, confidentiality, availability and secure accessibility of the information and its own data and that of third parties.
The fundamental principles of security in the handling of information are:
Top management must establish an information security policy that:
The information security policy must:
The top management of the organization must lead the implementation of the ISMS demonstrating its commitment to the ISMS: Making sure that the policies and objectives of the ISMS are established and integrated with the processes of the organization.
Their responsibilities in terms of information security will be the following: Prepare, promote and maintain the information security policy. Prepare the risk plan and possible solutions to mitigate the threats. Propose new objectives in terms of information security.
The goal is to provide guidance and support for information security management in accordance with business requirements, relevant laws and regulations.
These policies manage the security of the company’s information from the highest management level of the organization, establishing a framework to control the implementation of the ISMS, the approval of the security policy, its distribution to employees, suppliers, customers, and ultimately for all interested parties, whether internal or external to the organization.
The information security policy is defined and approved by Management and must take into account the characteristics of the business, the contractual requirements signed with clients, as well as the most relevant legislation that affects the Information Security Management System.
A set of information security policies must be defined, approved by Management, published and communicated to employees and relevant external parties.
All information security policies that are implemented have been previously approved by the organization’s Management.
The information security policies are communicated to the personnel through the intranet while, for the interested parties, the communication of the policies is carried out through the corporate website and, in some cases by email or by means of a release.
Information is a fundamental asset for the provision of its services and efficient decision-making, which is why there is an express commitment to protect its most significant properties as part of a strategy aimed at business continuity, risk management and the consolidation of a safety culture.
Aware of your current needs, we have implemented an Information Security Management System as the tool that allows you to identify and minimize the risks to which the information is exposed, establishes a security culture and guarantees compliance with current legal and contractual requirements. and other requirements of our clients and interested parties.
As a fundamental point of the policy is the implementation, operation and maintenance of an ISMS based on ISO 27001.
Basic aspects of the information security policy:
The objectives of this Policy will be:
This Policy applies to all information managed in the Company, whatever the medium it is on.
The owners of the information are in charge of classifying it according to its degree of sensitivity and criticality, documenting and keeping the classification carried out updated, and defining the functions that must have access permissions to the information.
The Information Security Manager is in charge of ensuring that the security requirements established according to the criticality of the information they process are contemplated for the use of information technology resources.
Each Information Owner will supervise that the information classification and labeling process of their department is completed in accordance with the provisions of this Policy.
The objectives of controlling the safety of personnel are:
This Policy applies to all Company personnel and external personnel performing tasks within the scope of the Company.
The Human Resources Department will include functions related to information security in employee job descriptions, will raise awareness, inform, and train all incoming personnel of their obligations regarding compliance with the Information Security Policy, will manage the Confidentiality Commitments with the staff and will coordinate the user training tasks regarding this Policy.
The Information Security Manager is in charge of monitoring, documenting and analyzing reported security incidents, as well as their communication to the Information Security Committee and the owners of the information.
The Information Security Committee will be responsible for implementing the means and channels necessary for the Information Security Manager to handle reports of incidents and system anomalies. Likewise, said Committee will be aware of, will monitor the investigation, will control the evolution and will promote the resolution of incidents related to information security.
The Information Security Manager will participate in the preparation of the Confidentiality Commitment to be signed by employees and third parties who carry out functions in the Company, in advising on the sanctions to be applied for non-compliance with this Policy and in the treatment of incidents. information security.
All Company personnel are responsible for reporting weaknesses and information security incidents that are detected in a timely manner.
Physical and Environmental Security is developed through the Management Systems implemented:
The objectives of said Management Systems are:
This Policy applies to all physical resources related to the Company’s information systems: facilities, equipment, cabling, files, storage media, etc.
The Head of Information Security will define, together with the Head of the Technical Department and the Information Owners, as appropriate, the physical and environmental security measures for the protection of critical assets, based on a risk analysis, and will control their implementation. Likewise, it will verify compliance with the provisions on physical and environmental security indicated in the Security Management Systems for the Supply and Environmental Chain.
The Head of the Technical Department will assist the Head of Information Security in defining the security measures to be implemented in protected areas, and will coordinate their implementation. Likewise, it will control the maintenance of computer equipment according to the indications of suppliers both inside and outside the Company’s facilities.
The Heads of the different Departments will define the levels of physical access of the Company’s personnel to the restricted areas under their responsibility. The Owners of the Information will formally authorize the work outside the facilities with information of their concern to the employees of the Company when they deem it convenient.
All Company personnel are responsible for compliance with the clean screens and desks policy, for the protection of information related to daily work in the offices.
The objectives of communications and systems management are:
Each Information Owner, together with the Information Security Manager and the Technical Department Manager, will determine the requirements to protect the information for which they are responsible. Likewise, it will approve the courier services authorized to transport the information when required, according to its level of criticality.
Controlling access to information systems has the following objectives:
The objectives of security in the development and maintenance of systems are:
This Policy applies to all computer systems, both self-developed or those of third parties, and to all Operating Systems and/or Software that make up any of the environments managed by the Company.
The Information Security Manager together with the Information Owner will define the controls to be implemented in the systems developed internally or by third parties, based on a prior risk assessment.
The Information Security Manager, together with the Information Owner, will define the protection requirements through cryptographic methods based on the criticality of the information. Then, the Head of Information Security will define, together with the Head of the Technical Department, the encryption methods to be used.
The security in the administration of the continuity of the activities of the company has as objectives:
The Information Security Manager will actively participate in the definition, documentation, testing and updating of contingency plans. The Information Owners and the Information Security Manager will fulfill the following functions:
Information security policies should be reviewed at planned intervals or whenever significant changes occur to ensure that their adequacy is maintained.
Department manager will ensure the correct implementation and compliance with the established information security standards and procedures, within their area of responsibility.
The Information Security Manager will carry out periodic reviews of all areas of the Company in order to guarantee compliance with information security policies, standards and procedures. Areas to review include:
The Information Owners will support the periodic review of compliance with applicable information security policies, standards, procedures and other requirements.
Signed: Direction
Last review: 19/07/2023
Subscribe to our newsletter receive updates on what’s coming to the market.
Financiado por la Unión Europea – NextGenerationEU
Sistema certificado por RINA en cumplimiento de la norma ISO/IEC 27001
Give us a little bit of information about your project and we will contact you soon with a tailored test plan for you!
Give us a little bit of information about your project and we will contact you soon with a tailored test plan for you!