BODEGAS BORDOY SL has carried out an Impact Assessment and its respective risk map of its personal data processing procedures. Considering the results thereof, it has applied the appropriate technical and organizational measures to guarantee a level of security appropriate to the risk expressed in the Impact Assessment. These security measures consider, in particular, the following aspects:
- In particular, the risks presented by the data processing have been taken into account, in accordance with the treatments provided in Annex E “Register of treatment activities”, in particular as a consequence of the destruction, loss or accidental or unlawful alteration of personal data. transmitted, conserved or otherwise processed, or unauthorized communication or access to said data
- BODEGAS BORDOY SL has taken all necessary measures to ensure that anyone who acts under their authority and has access to personal data can only treat such data following the instructions provided in this document
In order to guarantee the adequate level of protection and required by current regulations on data protection, BODEGAS BORDOY SL will apply the following standards, procedures and standards related to the data security of BODEGAS BORDOY SL systems.
6.2.1 Access to data through communication networks
When in BODEGAS BORDOY SL there are Treatment Managers who have remote access to their information systems, these connections must allow the application of the same security measures, equivalent to a connection in a local area, measures described in these Measures and Procedures .
In Annex B “Access to Data through Communication Networks” all the Treatment Managers who have an authorized remote access to the information systems of BODEGAS BORDOY SL are listed.
6.2.2 Special categories of data
BODEGAS BORDOY SL does not deal with special categories of data through public networks or wireless electronic communications networks, which will not require the encryption of data in this regard. Likewise, at the time BODEGAS BORDOY SL treats personal data of a special nature, it will encrypt this data or use any other mechanism that guarantees that the information can not be understood or manipulated by third parties.
6.2.3 Regime of work outside the premises of location of the systems of treatment
In BODEGAS BORDOY SL there are no portable devices. In the event that portable devices are incorporated in BODEGAS BORDOY SL and that data processing is processed in their logical units, these treatments must be previously authorized by the Data Protection Delegate, and these will be related and authorized in the Annex H “Work Regime Outside the Location Locations of the treatment systems” and following the aforementioned policy continuation.
Employees of BODEGAS BORDOY SL that have a portable device assigned, will be informed of the prohibition, except authorized exceptions, of storing personal data in the logical units of the portable devices and of the obligation to work with personal data only. on the logical units defined in the local server. In addition, they will apply the security measures implemented in BODEGAS BORDOY SL, which are defined in the current security regulations.
It will be mandatory that in portable devices, the same established criteria for identification, authentication and access control are defined, defined in the security regulations, provided that they connect to the local network or access remotely.
In any case, the recording of special categories of data or of high level in the logical units of the portable devices will be allowed without their prior authorization.
6.2.4 Identification and authentication
The procedure followed in BODEGAS BORDOY SL for the identification and authentication of the users when they try to access the system, the network or the applications is based on the combination of a user identification code and a password that the computer system will collate in each attempt of access in order to verify that said access is authorized or not.
Each user has been assigned a unique and non-transferable identification for both access to the system and access to applications.
In BODEGAS BORDOY SL there is a policy of allocation, distribution and storage of users and passwords that guarantees their confidentiality and integrity, establishing in this policy also the periodicity in which the change of passwords will be required. This policy is found in Annex D “Identification and Authentication”.
6.2.5 Control of access
The users of BODEGAS BORDOY SL will receive their access rights following the policy of minimum privilege, assigning them a unique identification code. That is, they will only access those data and computing resources they need to carry out their functions.
The Privacy Manager or those employees that have been assigned this task, will determine the applications that will be accessible to each user.
Annex D “Identification and Authentication” indicates the procedure to be followed in order to obtain the list of users with authorized access to the network and the applications, as well as the rights granted to them.
In Annex D “Identification and Authentication”, the list of users with authorized access to each information system is included. In addition, the type of authorized access for each of them is included. This list will be updated by the Privacy or Security Manager, or by the staff to whom this task has been thin, each time a user receives new privileges or each time a new user is registered with access to data of a character personal.
When for the provision of a service to BODEGAS BORDOY SL by personnel of third companies, these personnel have access to the resources of BODEGAS BORDOY SL, will be subject to the same conditions and security obligations as the own personnel of BODEGAS BORDOY SL.
6.2.6 Management supports
In BODEGAS BORDOY SL, media containing personal data will be labeled allowing identification. In the same way, they will be inventoried and stored in the facilities where the information systems are located (servers and communication equipment). This place will be considered restricted access and can only be accessed by the personnel authorized by the Treatment Manager.
Likewise, BODEGAS BORDOY SL has different employee profiles. All employees who require access to computer media that contain personal data, is authorized at the time of signing the employment contract with the company. Even for the sending and receiving of emails with attached documents.
In this way, access to media will be understood as authorized from the moment the employee signs the employment contract with BODEGAS BORDOY SL.
This authorization will be understood as valid, provided that the employment contract remains in force. When the employment relationship with the employee ceases, the authorization will be understood as terminated.
6.2.7 Backup and recovery procedures
BODEGAS BORDOY SL has established a procedure for making backup copies with weekly minimum periodicity, unless in that period there was no update of the data.
The mentioned procedure for the recovery of the data must guarantee at all times its reconstruction in the state in which they were at the time of the loss or destruction.
Only, in the event that the loss or destruction, affect data categories or partially automated treatments and provided that the existence of documentation to achieve the objective referred to in the previous paragraph, will be manually recorded data.
The procedure establishes a verification at least every six months to ensure the correct definition, operation and application of the backup and recovery procedures of the data.
The architecture of the backup procedure is detailed in Annex I “Backup and Recovery Procedures”.
6.2.8 Inventory of computer applications
BODEGAS BORDOY SL has developed an inventory of computer applications in order to be able to manage and indicate the location of the existing data categories within the computer systems.
In Appendix J “Inventory of computer applications” is the list of computer applications used by BODEGAS BORDOY SL. This inventory will be updated by the Privacy or Security Manager, or by the personnel to whom this work has been thin, insofar as computer applications are replaced, deleted or added within the information management systems of the data categories.
6.2.9 Non- automated processing procedures
Non-automated treatment is understood as any set of personal data organized in a non-automated and structured manner according to specific criteria relating to natural persons, which allow disproportionate access to your personal data, whether centralized, decentralized, functionally distributed or geographic. In a generic way, non-automated treatment will be considered any document in which personal data are found in a non-computer format (invoices, budgets, delivery notes, contracts, CVs, etc.).
The security measures described above for the automated data categories will apply to the non-automated data categories. Additionally, Annex M “Non-automated treatment operations” describes the security measures applicable only to processing operations performed exclusively on paper.
6.2.10 Contracts for the provision of services
BODEGAS BORDOY SL has hired different service providers that perform data processing under their responsibility, BODEGAS BORDOY SL has documented in Annex G “Relationship of Treatment Managers” the updated list of all those service providers, that for the services that are being provided, have access to personal data under the responsibility of BODEGAS BORDOY SL.
These must include the following information:
- Manager Treatment
- Reason Social
- CIF
- Purposes of the treatment
- Categories of interested parties and categories of personal data
- Technical and organizational security measures