1. APPROVAL AND ENTRY INTO FORCE
Text approved on January 9, 2025, by the Board of Directors of Medity Platforms S.L.
This Information Security Policy (hereinafter, the Security Policy) will enter into force the day after the date indicated above and will remain in effect until it is replaced by a new policy.
2. PURPOSE
Medity Platforms S.L. considers information an essential asset for the proper performance of its functions. Much of the information contained in the information systems of public administrations and the services they provide constitute strategic national assets. The information and services provided are subject to threats and risks arising from malicious or illegal actions, errors or failures, and accidents or disasters.
In its effort to ensure that the services offered electronically to clients are provided with levels of security equivalent to those experienced when interacting in person at the company’s facilities, Medity Platforms S.L. develops and approves this Information Security Policy, applying the minimum security measures required by the National Security Scheme (ENS) regarding:
The different areas and services must ensure that information security is a vital part of the public services provided by Medity Platforms S.L., and must safeguard said information throughout its entire lifecycle (collection, transport, processing, storage, and destruction). Areas and services must be prepared to prevent, detect, react to and recover from incidents, thus ensuring the continuity of service provision with adequate quality and safety.
This Security Policy ensures a clear commitment from the highest authorities of the entity to the dissemination, consolidation and compliance with this Policy.
3. SCOPE
This Security Policy applies to all areas, services, and internal and external employees of Medity Platforms S.L., regardless of their hierarchical classification. It also applies to all information systems and communication infrastructures used to perform the functions of Medity Platforms S.L.
With this information security policy, the organization demonstrates its commitment to establishing, implementing, maintaining, and continuously improving a security management system in accordance with the principles set forth in Article 5 of Royal Decree 311/2022. That is:
4. MISSION AND OBJECTIVES
Medity Platforms S.L., in its commitment to fulfilling its assigned interests, functions, and responsibilities, provides its clients with the services and activities necessary to satisfy their aspirations and interests. Medity Platforms S.L. utilizes appropriate technologies and values its electronic relationship with clients, building the necessary trust based on a comprehensive information security system that extends throughout the entire company.
These systems aim to guarantee the quality of information and the continuous provision of services by acting proactively, monitoring daily activity, and responding promptly to incidents. To this end, the following general objectives are established in the area of information security:
5. REGULATORY FRAMEWORK
This National Security Framework (ENS), currently regulated by Royal Decree 311/2022 of May 3, establishes the security policy to be applied in the use of electronic means. The ENS comprises the basic principles and minimum requirements for adequate information protection. It will be applied by Public Administrations to ensure the access, integrity, availability, authenticity, confidentiality, traceability, and preservation of the data, information, and services used in electronic means that they manage in the exercise of their powers.
The National Interoperability Framework (ENI), regulated by Royal Decree 4/2010 of January 8, establishes the set of criteria and recommendations that Public Administrations must consider when making technological decisions that guarantee interoperability. Complementary technical interoperability standards develop certain technical aspects.
Laws 39/2015 and 40/2015 regulate the Common Administrative Procedure and the Legal Framework of Public Administrations. These laws expressly refer to the National Security Scheme (ENS) as a secure information management system for public administrations and to the National Interoperability Framework (ENI) as a benchmark for interoperability between administrations.
[Law 9/2017, of November 8, on Public Sector Contracts, which transposes into Spanish law Directives 2014/23/EU and 2014/24/EU of the European Parliament and of the Council of February 26, 2014, regulating public procurement procedures]
Likewise, Organic Law 3/2018, of December 5, on Data Protection and Guarantee of Digital Rights, aims to guarantee and protect, with regard to the processing of personal data, the fundamental rights and freedoms of individuals, and especially their honor and personal and family privacy, as well as guaranteeing citizens’ digital rights in accordance with the mandate established in Article 18.4 of the Constitution.
Regulation (EU) 2016/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data establishes the obligation to implement technical and organizational measures to guarantee the confidentiality, availability, and integrity of information. It also stipulates that these measures must be proactive and that the data controller must be able to demonstrate that these measures are being followed and their application.
Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 on measures to ensure a high common level of security of network and information systems across the Union establishes obligations for all Member States to adopt a national network and information systems security strategy and to establish security and notification requirements for operators of essential services and for digital service providers.
Royal Decree 43/2021, of January 26, which develops Royal Decree-Law 12/2018, of September 7, on the security of networks and information systems, ensuring the alignment of Spanish law with the harmonised European framework in accordance with Directive 2016/1148 (NIS Directive).
This Royal Decree aims to specify some of the main obligations and procedures to be used in order to ensure optimal security risk management in networks and information systems in critical sectors, as well as to ensure adequate coordination among the various actors involved in these types of risk situations. To this end, a series of organizational and operational obligations have been established for operators subject to this regime, such as the definition of technical and organizational measures for the proper management of cybersecurity risks, the designation of a security officer, and the notification and management of security incidents.
Law 2/2019, of March 1, amends the consolidated text of the Intellectual Property Law, approved by Royal Legislative Decree 1/1996, of April 12.
Furthermore, the regulatory framework will be reviewed and updated in accordance with the regulatory compliance standard, as indicated in document ENS.REG.01 CM Dashboard. It will be reviewed periodically on an annual basis, as well as on an extraordinary basis when there is any change that requires the updating and revision of the same.
6. SECURITY ORGANIZATION
To proactively manage and coordinate information security, the INFORMATION SECURITY COMMITTEE is established as the management body.
This Committee will be composed of the following positions:
However, given the structure and composition of Conecta Consultores, and the need to concentrate the roles stipulated in the National Security Framework (ENS) into two people, the criteria expressed in the CCN-STIC 801 ICT Security Guide on Roles and Responsibilities, in its Annex B, will be adopted. This Annex outlines the distribution of responsibilities in entities with a minimal structure, distinguishing between:
Furthermore, given the structure of Medity Platform, the option of delegating the functions of the security and system managers, including outsourcing them, may be considered, without prejudice to the ultimate responsibility that will always remain with Medity Platform.
The designation of positions and functions will be formalized through NM.ENS-01 Security Committee Appointment, and will require the express acceptance of the appointees.
a. INFORMATION MANAGER
It will determine the requirements for the information processed.
It has ultimate responsibility for the use made of certain information and, therefore, for its protection. It will advise on and have the authority to technically determine the security requirements for information and services. It will also have the authority to determine the levels of information security.
It will also report on the status of security in the area of information and communication systems. It may convene meetings and send information and communications to the members of the committee.
b. SERVICE MANAGER
It will determine the requirements for the services provided.
It will be the person or persons responsible for the operation of the different areas of the entity, establishing requirements, objectives, and means for carrying out these tasks. It will determine the security requirements for the services provided. This includes the responsibility for determining the security levels of the services, and for this purpose, it may seek advice from the security manager and the system manager.
It will include security specifications throughout the lifecycle of services and systems, accompanied by the corresponding control procedures. It will also be responsible for assessing the consequences of any negative impact on service security, taking into account the repercussions on Medity Platforms S.L.’s ability to achieve its objectives, protect its assets, fulfill its service obligations, comply with the law, and respect citizens’ rights.
Furthermore, they will be responsible for monitoring compliance with security regulations within their area and reporting to the Information Officer on compliance with the security regulations approved by the Security Committee.
c. SECURITY OFFICER
The Security Officer will determine the decisions necessary to meet information and service security requirements, oversee the implementation of the measures required to ensure these requirements are met, and report on these matters.
This individual is designated by the highest governing body to oversee the information security system and will be responsible for determining the relevant security decisions to meet the requirements established by those responsible for information and services.
The two essential functions of the Security Officer are:
If the information system, due to its complexity, distribution, physical separation, or number of users, so requires, Medity Platforms S.L. may appoint Delegate Security Officers, to whom functions may be delegated, but never responsibilities. These Delegate Security Officers will report directly to the Security Officer.
The functions assigned to the Security Officer include the following:
d. SYSTEM ADMINISTRATOR
This role is responsible for developing the specific methods for implementing system security and overseeing its daily operation. They may delegate this responsibility to administrators or operators under their supervision.
This role is responsible for the operation of the information system, adhering to the security measures determined by the Security Officer. Their responsibility may lie within the organization (using in-house systems) or be divided between indirect responsibility (within the organization) and direct responsibility (with third parties, public or private), when information systems are outsourced. Their specific functions are as follows:
If the information system, due to its complexity, distribution, physical separation, or number of users, requires additional personnel to perform these functions, Medity Platforms S.L. may appoint Delegate System Managers, to whom functions may be delegated, but never responsibilities. These Delegate System Managers will report directly to the System Manager.
e. SECURITY ADMINISTRATOR
Their most significant functions would be the following:
The Security Administrator may report to either the System Administrator or the Security Officer, but not both simultaneously.
It is not mandatory to appoint a Security Administrator; if not required, their functions will be assumed by the Security Officer.
f. SECRETARY
The Secretary will be responsible for ensuring that the procedures approved by the Committee comply with the law, as well as advising the Committee on this matter. They will also keep minutes of the meetings.
g. DATA PROTECTION OFFICER
It will oversee and advise on the protection of data subjects’ rights regarding data protection.
APPOINTMENT
The members of this Committee will be appointed by the Manager of Medity Platforms S.L., and the rest of the Medity Platforms S.L. employees will be informed subsequently, with transitional measures in place to ensure security compliance. Furthermore, future resolutions regarding the appointment of area managers, heads of affiliated entities, or changes in the distribution of functions between areas and entities must expressly include the appointment of a member to this information security committee.
6.1 FUNCTIONS OF THE SAFETY COMMITTEE
Their functions are as follows:
The Information Security Committee is not a technical committee, but it will regularly gather relevant information from its own or external technical staff to inform its decision-making. The Information Security Committee will seek advice on matters on which it must make decisions or issue opinions. This advice will be determined on a case-by-case basis and may take various forms:
6.2 DOCUMENT MANAGEMENT AND STRUCTURE
Documented information regarding security controls must be communicated to all personnel working at the organization (employees and suppliers), who will be obligated to apply it in the performance of their work activities, thereby committing to compliance with the requirements of the National Security Framework (ENS).
Documented information will be classified as: public or publishable, internal, confidential, and secret, and its use will be appropriate according to this classification and the criteria established in the information classification regulations.
A procedure will define the labeling criteria for the documents that form part of the Information System.
Thus, the documentation that comprises this system is distributed as follows.
This same order determines the hierarchy and precedence of these documents.
The employee portal will make available to members of the organization the documents that may be of interest to them, and this will also be communicated during both the onboarding process and initial training.
Likewise, in the ENS.REG.01 CM Dashboard registry, all documents that are part of the catalog of the system covered by this policy will be compiled. The Security Officer may designate a person responsible for maintaining and updating the system documentation.
7. AWARENESS
Medity Platforms S.L. will establish the necessary mechanisms, taking into account the proposals of the Security Committee, to ensure that all personnel have the appropriate information, training, and awareness to manage information in accordance with this Security Policy and its derived internal regulations, both in terms of privacy and security.
The Committee will establish appropriate mechanisms for disseminating information and will record all training activities carried out in this regard.
8. RISK MANAGEMENT
Medity Platforms S.L. will periodically conduct a Risk Analysis, and whenever its information systems undergo a significant alteration, following the guidelines set forth in Article 6 of the National Security Scheme (ENS), in order to anticipate existing risks. This Risk Analysis and its conclusions must be reviewed by the Security Committee, which will then establish appropriate safeguards to ensure an acceptable level of risk.
To this end, the Committee will develop a Risk Analysis and Potential Impact Assessment procedure that clearly defines acceptable risk levels, criteria for accepting residual risk, the frequency of the analysis, and when it will be performed in exceptional circumstances.
The risk analysis conducted by Medity Platforms S.L. will also specifically address those risks arising from the processing of personal data in the performance of its duties.
9. PERSONAL DATA PROTECTION
Medity Platforms S.L. will only collect personal data when it is adequate, relevant, and not excessive, and when it is related to the scope and purposes for which it was obtained. Likewise, it will adopt the appropriate technical and organizational measures to comply with data protection legislation.
These measures, as indicated in the first additional provision of Law 3/2018 of December 5, on Data Protection and Guarantee of Digital Rights, will correspond to those described in the National Security Framework, which will be defined in the corresponding policies, regulations, and procedures.
10. APPROVAL AND REVIEW OF THIS SECURITY POLICY
This security policy must be a document that accurately reflects the commitment of Medity Platforms S.L. and related entities to information security. Therefore, this policy may be modified at the proposal of the Security Committee to adapt to changes in the legislative, technical, or organizational environment. Both the initial approval of this policy and its future revision will be carried out by the competent senior body of the entity following a proposal from the information security committee.
| © 2025 All rights reserved | Legal Notice | Privacy Policy | Contact | Security Policy | Terms and Conditions App