Information Security is the protection of information against a wide range of threats to ensure business continuity, minimize business risks, and maximize the return on investments and business opportunities. eSolutions considers information and associated systems as critical assets that must be protected to ensure the proper operation of the organization’s services and compliance with legal and contractual obligations. The Information Security Policy is aimed at effectively managing the security of information handled by the company’s IT systems, as well as the assets involved in its processes.
1. OBJECTIVE:
This Policy aims to establish the framework under which the organization guarantees the confidentiality, integrity, and availability of its own information and that of its clients, as well as compliance with current Laws and Regulations at all times. It maintains a balance between risk levels and efficient use of resources, with proportionality criteria.
2. SCOPE:
This Information Security policy is to be considered by all members of the eSolutions organization: employees, external staff, suppliers, contractors, business partners, and third parties who access, process, and/or handle eSolutions information.
3. DEFINITIONS:
4. MANAGEMENT MODEL:
eSolutions promotes a management model applicable toInformation Security based on the international standard ISO/IEC 27001, facilitating, by all meanswithin its reach and proportionate to detected threats, the necessary resources for theorganization to have an environment aligned with business objectives and establishedcybersecurity goals. The model defined by eSolutions is based on:
5. GUIDELINES:
Implementing a secure information environment is achieved by complying with the following critical factors:
6. OWNERSHIP OF INFORMATION:
All data, programs, systems, and procedures (hereinafterreferred to as “information”) collected, stored, processed, and/or maintained by the Companyfor business purposes are owned by eSolutions unless explicitly stated otherwise in a contractualagreement.
7. INFORMATION CRITICALITY:
Information is a key asset; therefore, the Company must maintaina properly secure environment for managing, processing, transporting, and distributing it. The“confidentiality, integrity, and availability” of information are essential to preservecompetitiveness, billing, profitability, compliance with legal requirements, and the Company’smarket image. Protection of strategic information and resources of both the Company and itsclients must be ensured whenever they are under eSolutions‘ control (Information ClassificationPolicy).
8. ACCEPTABLE USE OF INFORMATION AND ASSOCIATED ASSETS:
9. RESPONSIBILITIES:
Coordinate the implementation and maintenance of a set of appropriate actions and measures to ensure that information and its supporting structure are protected from destruction, corruption, unauthorized access, and confidentiality breaches, both accidental and deliberate. Effective information security can only be achieved through consistent measures and actions, continuous monitoring, close cooperation, and awareness at all corporate levels. To this end, the following measures and actions are detailed:
10. NON-COMPLIANCE:
Failure to comply with or violation of any aspects outlined in this policy and the supporting Security Policies may result in:
Apply the Mission, Vision, and Values in the activities of the Quality Management System (QMS) with the objective of delivering value to our clients within a framework of continuous improvement.