Portima Information Security Policy
Versie 11
Document summary |
This document outlines Portima's commitment to protecting the confidentiality, integrity, and availability of information. The purpose of this policy is to ensure the protection of information assets and reduce the risk of information security incidents. |
||
Intended Audience |
Portima employees, contractors and any other individuals who access Portima's systems and data. |
||
Process |
Information Security |
||
Issue date |
23/08/2023 |
||
Next review date |
08/2024 |
||
Document manager |
Portima ISMS Coordinator |
||
Approval level |
CODIR |
||
Classification level |
Public |
||
Reference |
ISMS 001 POL |
||
Version |
V.1.1 |
||
Status |
Approved |
Date |
24/08/2023 |
The latest approved version of this document is available at: |
Sharepoint and portima.com |
History
Version |
Updated by |
Date |
Description of changes |
1.1 |
ISMS Coordinator |
23/08/2023 |
Classification level adapted from internal to public Audience for Data Privacy Policy |
Table of Contents
- Introduction
- Scope
- Portima’s commitment to information security
- Information security policy framework
- Information Security Risk Management
- Information security roles and responsibilities
- Data Classification
- Training and Awareness
- Review and Auditing
- Policy enforcement
- Reference
- Glossary
1. Introduction
This policy outlines Portima's commitment to protecting the confidentiality, integrity, and availability of information. The purpose of this policy is to ensure the protection of information assets and reduce the risk of information security incidents.
The information security policy describes Portima’s responsibility to:
- Protect the confidentiality, integrity, and availability of business-critical information, based on good practices;
- Ensure that the aforementioned information is exchanged with external parties (e.g., stakeholders, customers and/or suppliers) in a secure manner;
- Prevent or minimizing the impact of information security incidents or breaches.
- Protect Portima’s business, reputation and to safeguard our people; and
- Ensure that Portima’s employees understand their roles and responsibilities.
It also defines procedures, baselines, and practices for the aforementioned resources to acquire adequate knowledge of the security policy and how to protect information from unauthorised use or disclosure.
2. Scope
This policy applies to all employees, contractors, and any other individuals who access Portima's systems and data. It’s considered as an umbrella above other policies (see section 4).
This policy covers all information assets, including physical, electronic, and confidential information, stored in any format or location. Either these information assets are owned or controlled by Portima, including but not limited to:
- Cloud infrastructure;
- All servers, workstations, laptops, mobile devices, and other computing devices;
- All network infrastructure, including routers, switches, and firewalls; and
- All data stored on Portima's systems, including but not limited to: financial information, personal information, confidential business information, and intellectual property.
3. Portima's commitment to information security
Portima’s CODIR acknowledges the expectations of both internal and external stakeholders regarding the information security posture of the organisation. More specifically, Portima’s CODIR is committed to achieve the following objectives:
- Protect the business processes and infrastructure related to software development, deployment and support of Brio and Portima Connect.
- Safeguarding the confidentiality, integrity, and availability of its data, using a risk-based approach.
- Complying with the legal requirements and meeting its business partners’ expectations.
In order to support this commitment and achieve the information security objectives Portima established and operates an Information Security Management System (ISMS). This ISMS is comprised of information security policies, standards and procedures designed to maintain, review and continually improve information security across Portima from a risk-based perspective.
4. Information security policy framework
As part of the risk-based ISMS, Portima established an information security policy framework comprised out of information security policies outlining the information security requirements to be adhered to by Portima employees and contractors. This information security policy framework is subject to the ISMS’ continual improvement process ensuring that these policies are maintained, reviewed and updated when relevant.
5. Information Security Risk Management
The Chief information security officer shall ensure that a risk assessment is conducted at least annually or when significant changes occur to Portima’s organisation or IT environment. This risk assessment shall be conducted in line with Portima’s Risk Assessment Methodology. The assessment shall provide a comprehensive explanation of the information security risks currently faced by Portima and determine specific treatment actions to manage these risks.
6. Information Security roles and responsabilities
Information security roles and responsibilities are defined and assigned at the different levels of Portima’s organisation while ensuring the segregation of duties. These roles and responsibilities are outlined and documented as part of the organisation’s ISMS Manual.
Role |
Description |
Name |
CEO |
|
Jan Peeters |
Chief Information Officer (CIO) |
|
Christophe Cloesen (CIO) |
Chief Information Security Officer (CISO) |
|
Mohamed Amine Youssef |
ISMS Coordinator |
tracked within the ISMS.
|
Valérie Dechamps |
System owner |
|
Cécile Louvrier (PO Portima Connect) Christophe Cloesen |
Data Protection Officer (DPO) |
|
Valérie Dechamps |
Chapter lead Product Owner |
|
Cécile Louvrier (PC) Matthieu Legros (PC) Daniel Wuidart (Brio) Koen Ramakers (Brio) Jean-Luc Loroy (Infra) Bart Pollet (Infra) |
|
|
Christophe Arnould (BCC) John Croon (Facility Mgr) |
Product security champion |
|
Mohamed Amine Youssef |
7. Data Classification
All Portima’s employees should classify and handle information based on Portima classification scheme outlined below:
Classification Levels |
Description |
Confidential |
Confidential data is information available only for authorised users who really need access to the information (e.g., strategic information, broker client data). |
Internal use |
By default, all documents and data belonging to Portima are considered “internal use”, except if they are classified “public” or “confidential” |
Public |
Public data is information that everyone has access to. It’s public information, freely accessible and can thus be openly used, reused and shared. |
8. Training and Awareness
Portima shall provide regular information security training and awareness activities (eg: phishing campaigns) to raise resources having access to its systems and data awareness regarding information security.
During onboarding, the employee/contractor shall also attend awareness sessions on the following topics:
- General ICT Security awareness
- GDPR
- Phishing reporting
- Human firewall
All those trainings and security awareness activities are mandatory.
9. Review and Auditing
Portima shall review and audit in a yearly basis its security policies and practices to ensure that they are effective, up-to-date and reflect changes in technology, business processes, and regulatory requirements.
10. Policy enforcement
The policy statements containing the terms “shall” and “shall not” indicate a requirement, while the terms “should” and “should not” indicate a recommendation.
Violation of this information security policy or any of Portima security policies or security procedures, whether through negligence or with malicious intent might be subject to administrative discipline and possible criminal pursuit.
11. Reference
ISO 27001:2022 Controls (Annex A) |
5. Leadership |
6. Planning |
A.5.1 Policies for information security |
A.5.2 Information security roles and responsibilities |
A.5.12 Classification of information |
A.5.13 Labelling of information |
A.5.24 Information security incident management planning and preparation |
12. Glossary
Term |
Description |
Availability |
A principle of assuring that information is accessible to and usable by an authorised individual or entity when required. |
Confidentiality |
Preserving authorized access to ensure that information and systems are only accessible to authorised users. |
Integrity |
The guarding against improper information modification or destruction. |
Information |
Knowledge concerning objects, such as facts, events, things, processes, or ideas that, within a certain context, has a particular meaning. |
Information security |
The set of the administrative and the technical measures (practices and methods) taken to ensure the protection of the Portima’s information and information systems. |