HISPASAT considers information to be a fundamental asset to its daily operations and has therefore established the necessary means to guarantee the integrity, availability, confidentiality, authenticity and traceability of information stored and processed in its information systems in the area of satellite control.
HISPASAT's Information Security Policy aims to establish general guidelines related to Information Security that enable the company to protect and ensure the integrity, availability, confidentiality, authenticity and traceability of all information captured, stored, processed and kept in their systems, and to safeguard the resources used when providing services. The aforementioned terms are understood as the following definitions:
The policy is integrally specified through its consistency with management principles, and shall be carried out by the Management System, which Management has committed to establish in accordance with the ISO standards aimed at achieving Models of Excellence. The policy is based on the management of people, management by processes and continual improvement, guaranteeing efficiency and effectiveness.
Information Security Objectives are coherent with this Policy and are annually revised and updated based on HISPASAT's assessment, allowing for on-going improvement in our performance.
Compliance with the applicable legal regulations and standards on Information Security, both national and international, and with current legislation in Spain on reproduction rights, patents, registered trademarks and anything considered to be related to copyright that applies to the Internet, and any other requirement that may apply to information security, as well as the decision to apply future standards and/or security regulations, shall be the commitment and responsibility of all employees and service providers at HISPASAT.
Management is committed to ensuring the following:
HISPASAT's personnel have the necessary means, training and information to protect the information assets used in daily operations, and it is strictly forbidden to tamper with such information or use it for different purposes.
Suppliers and subcontractors shall be bound by this Policy to protect and ensure the integrity, availability, confidentiality and traceability of information and resources used for their services.