Information Security Policy

Information security policy

1. Introduction

Information has become one of the main assets of our organization, and it is for this reason that caring for and protecting it becomes an absolutely priority objective.

It is part of our strategy, from now on, to maintain the security of information as a critical and fundamental element. This challenge increases in requirement and importance if we apply it to an environment as specific and critical as ours, where the treatment and secure management of information are imposed as a necessity to compete and improve in the future.

NEOSISTEC AND NAVILENS PROJECTS CORP. (hereinafter NEOSISTEC AND NAVILENS PROJECT CORPS.) depends on ICT systems (Information and Communication Technologies) to achieve its objectives. These systems must be managed with diligence, taking the appropriate measures to protect them against accidental or deliberate damage that may affect the availability, integrity, confidentiality, authenticity and traceability of the information treated or the services provided.

The objective of information security is to guarantee the quality of the information and the continuous provision of the services, acting preventively, supervising the daily activity and reacting promptly to incidents.

ICT systems must be protected against rapidly evolving threats with the potential to impact availability, integrity, confidentiality, authenticity and traceability, intended use and value of the information and services. To defend against these threats, a strategy is required that adapts to changes in the environmental conditions to guarantee the continuous provision of services. This implies that departments must apply the minimum security measures required by the National Security Scheme (ENS) as well as the international standard ISO27001, as well as perform continuous monitoring of the levels of service provision, follow and analyze reported vulnerabilities, and prepare an effective response to incidents to guarantee the continuity of the services provided.

The different departments must ensure that ICT security is an integral part of each stage of the system's life cycle, from its conception to its withdrawal from service, passing through the decisions of development or acquisition and the operations activities. Security requirements and financing needs must be identified and included in the planning, in the request for offers, and in tender specifications for ICT projects.

Departments must be prepared to prevent, detect, react and recover from incidents, according to Article 7 of the ENS.

1.1 Prevention

Departments must avoid, or at least prevent as far as possible, that information or services are harmed by security incidents. To do this, departments must implement the minimum security measures determined by the ENS, as well as any additional control identified through a threat and risk assessment. These controls, and the security roles and responsibilities of all personnel, must be clearly defined and documented. To guarantee compliance with the policy, departments must:

1.2 Detection

Since services can degrade rapidly due to incidents, ranging from a simple slowdown to their stoppage, services must monitor the operation continuously to detect anomalies in the levels of service provision and act accordingly according to what is established in Article 9 of the ENS. Monitoring is especially relevant when defense lines are established according to Article 8 of the ENS. Detection, analysis and reporting mechanisms will be established that reach those responsible regularly when a significant deviation from the parameters that have been pre-established as normal occurs.

1.3 Response

Departments must:

1.4 Recovery

To guarantee the availability of critical services, departments must develop continuity plans for ICT systems as part of their general business continuity plan and recovery activities.

2. Object and scope

The purpose of this high-level Policy is to define the objective, direction, principles and basic rules for the management of information security.

This Policy applies to the entire Information Security Management System (ISMS) and to all employees of NEOSISTEC AND NAVILENS PROJECTS CORP. And extensible to third parties that perform processing of information owned by NEOSISTEC AND NAVILENS PROJECTS CORP.

The Security Policy applies to the entire company and its information assets:

3. References and regulatory framework

The management of NEOSISTEC AND NAVILENS PROJECT CORPS. ensures that the documentation of external origin that results of interest for the operation of the company is known by the employees of the company who need it and is maintained updated and available at all times.

Regarding standards applied to formalize the different Security procedures established, the criteria of the following international standards have been followed:

Information technology. Security techniques. Information Security Management Systems (ISMS). Requirements. UNE-ISO/IEC 27001

Information technology. Security techniques. Code of Good Practices for Information Security Management. UNE-ISO/IEC 27002

Requirements of stakeholders

Additionally, the register "SGSI84_RE07_ Applicable Regulations Register" is created to nourish all information, links of interest and information related to the applied Regulations. Below is an extract of the general applicable regulations:

4. Organization of the Security

4.1 Committees: functions and responsibilities

A security committee is formed, whose members and emails remain reserved from this publication for security reasons. Nevertheless, it will be communicated on the intranet, as well as it can be shared with stakeholders upon demand.

There is a mail distribution list called comiteseguridad@navilens.com to respond to any internal/external need in information security.

Each head of their area may modify and adapt documents or procedures that are within their competence without the express approval of the rest of the committee, as long as these modifications do not significantly alter the operation of the ISMS. In any case, the committee must be informed of these modifications.

Below, the functions and responsibilities of the Security Committee are listed.

4.2 Roles: functions and responsibilities

Executive Direction

Participates in the preparation of objectives and measurements. Approves the policies. Approves the reviews by management of the ISMS. Validates the conclusions of the systems audits.

The executive direction establishes the organization chart of the organization that contains more functions and roles than those specified here. In this policy we detail the responsibles related to information security.

Security Officer

System Responsible

Data Protection Officer

Service Responsible

Information Responsible

Users and employees

4.3 Designation procedures

The Information Security Responsible will be named by the Direction at the proposal of the Security Committee. The appointment will be reviewed every 2 years or when the position remains vacant. The Department responsible for a service that is provided electronically according to Law 39/2015 (Law of Common Administrative Procedure) and Law 40/2015 (Legal Regime of the Public Sector) will designate the System Responsible, specifying their functions and responsibilities within the framework established by this Policy.

4.4 Information security policy

The Information Security Committee is the one in charge of building and maintaining the Information Security Policy, although, it is the Direction of NEOSISTEC AND NAVILENS PROJECTS CORP. the responsible for the approval and publication of said Policy, as well as for distributing it to all employees and third parties affected.

Any change or evolution that affects or could affect the content of the Information Security Policy will remain recorded in a new signature of the approval document. In this way the commitment of these entities for information security is specified and confirmed.

Periodically, and in any case not exceeding the term of one year, the validity and reasonableness of the present policy will be reviewed and the improvements, adaptations or modifications required in function of the organizational, technical or regulatory changes applicable will be carried out.

4.5. Distribution of the Security Policy

The distribution of the security policy will be distributed in the following ways in function of the stakeholder group to which it is addressed:

4.6. Level of information security

The Organization has a policy “SGSI05_PO02- Policy for classification, labeling and handling of the information”, in which the classification system is defined, the assignment criteria based on nature, sensitivity, impact and legal requirements, as well as the controls associated to each level.

The organization has a procedure for categorization of the system formally defined based on the CCN-STIC 803 Guide: Valuation of the systems by means of which it is concluded that SGSI192_PR029-Procedure for categorization of the system - Google Documents: “According to Royal Decree 311/2022, of May 3 and the guidelines of the CCN-STIC 803 Guide, the category of a system is determined by the highest level of the dimensions evaluated (Confidentiality, Integrity, Availability, Traceability and Authenticity) in all services and the associated information.

In this case:

Therefore, according to the ENS, the category of the system is High, which implies that the corresponding security measures to said category gathered in Annex II of the ENS must be implemented.”

5. Sanctions

Any premeditated or negligent violation of the security policies and rules and that supposes a potential damage, consummated or not to NEOSISTEC AND NAVILENS PROJECTS CORP., will be sanctioned according to the mechanisms enabled in the Company agreement and in the current legal, contractual and corporate regulations.

All the actions in which the security of NEOSISTEC AND NAVILENS PROJECTS CORP. is compromised and that are not provided in this policy, must be reviewed by the Executive Direction and by the Information Security Responsible to dictate a resolution submitting to the criteria of the company and the provided legislation.

The disciplinary actions in response to the non-fulfillments of the Information Security Policy are attribution of the Executive Direction of NEOSISTEC AND NAVILENS PROJECTS CORP. and of the government bodies according to the applicable legislation.

There is a whistleblower channel and a protocol for incident management placed at disposal of the workers through which any member of the company can communicate a possible incident or non-fulfillment to the security committee or to the security responsible.

Said infraction and the corresponding sanction will be communicated to the infractor by a member of direction through email with a request for confirmation of receipt.

6. Mission

As a response to a new technological environment where the convergence between informatics and communications are facilitating a new paradigm of productivity for companies, NEOSISTEC AND NAVILENS PROJECTS CORP., is highly committed to maintaining the Promotion of research, technological development and innovation projects, in an environment of quality, where the development of good practices in Information Security is fundamental to achieve the objectives of availability, integrity, confidentiality, authenticity and traceability and legality of all the information managed. In consequence to the above, NEOSISTEC AND NAVILENS PROJECTS CORP., defines the following application principles to be taken into account in the framework of the Information Security Management System (ISMS):

The Direction of NEOSISTEC AND NAVILENS PROJECTS CORP., understands its duty to guarantee the security of the information as an essential element for the correct performance of the services of the organization, and, therefore, supports the following objectives and principles:

  1. Implement the value of Information Security in the set of the Organization.
  2. Contribute, each and every one of the persons of NEOSISTEC AND NAVILENS PROJECTS CORP., to the protection of Information Security.
  3. Preserve the availability, integrity, confidentiality, authenticity and traceability and resilience of the information, with the objective of guaranteeing that the legal, regulatory requirements and those of our clients relative to information security are fulfilled; and specifically in what respects data of personal character:
    • The data will be treated in a lawful, fair and transparent manner in relation with the data subject (Lawfulness, fairness and transparency).
    • They will be collected for specified, explicit and legitimate purposes, and will not be treated later in a way incompatible with said purposes (Purpose limitation).
    • The data will be adequate, relevant and limited to what is necessary in relation with the purposes for which they are treated (Data minimization).
    • The data must be accurate and, if it were necessary, updated; all the reasonable measures will be adopted so that the personal data that are inaccurate with respect to the purposes for which they are treated are suppressed or rectified without delay (Accuracy).
    • Maintained in a way that allows the identification of the data subjects during no more time than necessary for the purposes of the processing of the personal data; personal data can be conserved during longer periods as long as they are treated exclusively with purposes of archive in public interest, scientific or historical research purposes or statistical purposes (Storage limitation).
    • Treated in a way that guarantees an adequate security of the personal data, including the protection against the unauthorized or unlawful processing and against its accidental loss, destruction or damage, by means of the application of appropriate technical or organizational measures (Integrity and confidentiality).
  4. Protect the information assets of NEOSISTEC AND NAVILENS PROJECTS CORP. from threats, whether internal or external, deliberate or accidental, with the objective of guaranteeing the continuity of the service offered to our clients and the security of the information.
  5. Establish an information security Plan that integrates the activities of prevention and minimization of the risk of security incidents based on the criteria of risk management established by NEOSISTEC AND NAVILENS PROJECTS CORP.
  6. Provide the necessary means to be able to perform the pertinent actions for the management of the identified risks.
  7. Assume the responsibility in the matter of awareness and training in information security as a means to guarantee the fulfillment of this policy.
  8. Extend our commitment to information security to our worker personnel and providers.
  9. Improve continuously the security through the establishment and periodic monitoring of information security objectives.

This Policy will be maintained, updated and adequate to the purposes of the Organization, aligning with the context of risk management of this. To this effect it will be reviewed at planned intervals or whenever significant changes occur, in order to ensure that its suitability, adequacy and effectiveness is maintained.

In the same way, to manage the risks that NEOSISTEC AND NAVILENS PROJECTS CORP faces, a formally defined risk assessment procedure is established. On its part, all the policies and procedures included in the ISMS will be reviewed, approved and promoted by the Executive Direction of NEOSISTEC AND NAVILENS PROJECTS CORP.

7. Risk Management

All the systems subject to this Policy must perform a risk analysis, evaluating the threats and the risks to which they are exposed. This analysis will be repeated:

For the harmonization of the risk analyses, the ICT Security Committee will establish a reference valuation for the different types of information handled and the different services provided. The ICT Security Committee will dynamize the availability of resources to attend to the security needs of the different systems, promoting investments of horizontal character.

8. Development of the Information Security Policy

This Policy will be developed by means of security rules that address specific aspects, as well as with other complementary policies. The security rules will be at disposal of all the members of the organization that need to know it, in particular for those that use, operate or manage the information and communications systems.

9. Obligations of the personnel

All the members of NEOSISTEC AND NAVILENS PROJECT CORPS. AND NAVILENS PROJECTS CORP. have the obligation of knowing and fulfilling this Information Security Policy and the Security Rules, being responsibility of the ICT Security Committee to dispose the necessary means so that the information reaches those affected. All the members of NEOSISTEC AND NAVILENS PROJECT CORPS. AND NAVILENS PROJECTS CORP. will attend to an awareness session in ICT security matter at least once a year. A continuous awareness program will be established to attend to all the members of the organization, in particular to those of new incorporation. The persons with responsibility in the use, operation or administration of ICT systems will receive training for the secure management of the systems in the measure in which they need it to perform their work. The training will be mandatory before assuming a responsibility, whether it is their first assignment or if it is a change of job position or of responsibilities in the same.

The Information Security is a joint effort, therefore it requires the implication and participation of all the members of the organization that work with the Information Systems of the organization. Therefore, each employee must fulfill the requirements of the Security Policy and its associated documentation.

The employees that deliberately or by negligence do not fulfill the Security Policy will be subject to disciplinary actions as contemplated in this document.

9.1. Definition of Information Responsibles

10. Third parties

The present Security Policy is of extensible knowledge and fulfillment for any external person belonging to third entities that performs any type of treatment over the information property of NEOSISTEC AND NAVILENS PROJECTS CORP.

When NEOSISTEC AND NAVILENS PROJECT CORPS. AND NAVILENS PROJECTS CORP. provides services to other organisms or handles information of other organisms, they will be made participants of this Information Security Policy, channels for reporting and coordination of the respective ICT Security Committees will be established and procedures of action for the reaction to security incidents will be established. When NEOSISTEC AND NAVILENS PROJECT CORPS. AND NAVILENS PROJECTS CORP. uses services of third parties or assigns information to third parties, they will be made participants of this Security Policy and of the Security Rules that concern said services or information. Said third party will remain subject to the obligations established in said rules, being able to develop their own operational procedures to satisfy it. Specific procedures for reporting and resolution of incidents will be established. It will be guaranteed that the personnel of third parties is adequately aware in security matter, at least at the same level as that established in this Policy. When some aspect of the Policy cannot be satisfied by a third party as required in the previous paragraphs, a report from the Security responsible will be required that specifies the risks in which it is incurred and the way to treat them. The approval of this report by the responsibles of the information and the affected services will be required before proceeding.

11. Approval and Validity

The present document has been approved by the Direction, with validity from December 19, 2025.