BPO LABS S.A.S, in order to ensure compliance with Statutory Law 1581 of 2012 on Data Protection (LEPD) and Decree 1377 of 2013, adopts this Internal Security Manual, which includes the necessary technical, human, and administrative measures to provide security to records in order to prevent their alteration, loss, consultation, unauthorized or fraudulent use or access, in accordance with the security principle stated in Article 4, letter g of the LEPD.
This manual belongs to: BPO LABS S.A.S.
The provisions of this document apply to the databases under the responsibility of BPO LABS S.A.S, as well as to the information systems, media, and equipment used in the processing of data, which must be protected in accordance with the current regulations, to the individuals involved in the processing, and to the premises where such databases are located.
The Internal Security Manual is an internal document of the company that is mandatory for all personnel of BPO LABS S.A.S. who have access to information systems containing personal data.
This manual must undergo continuous review and updating whenever there are changes in the information systems, the processing system, the organization, or the content of the database information that may affect the implemented security measures. Additionally, the manual must always be in compliance with the legal regulations regarding the security of personal data.
The databases are only accessible by individuals designated by BPO LABS S.A.S, as referred to in section 6 of this document.
The security officers of BPO LABS S.A.S, mentioned in section 6 of this manual, are responsible for managing user access permissions, the procedure for assigning and distributing passwords to ensure confidentiality, integrity, and storage during their validity period, as well as the frequency at which passwords are changed.
The following are the security measures implemented by BPO LABS S.A.S:
The documents and media containing the databases are determined in the inventory of documents and media. Authorized users who have access to these documents and media are responsible for ensuring that unauthorized individuals cannot access them. The authorized users are specified in section 6 on databases and information systems in this manual. The documents and media must classify the data according to the type of information they contain, be inventoried, and be accessible only to authorized personnel, unless their characteristics make it impossible to identify them, in which case a justified record will be made in the incoming and outgoing document register and in the Internal Security Manual. Documents and media containing sensitive personal data must be identified using comprehensible and meaningful labeling systems that allow authorized users to identify their content and make identification difficult for other individuals. The removal of documents and media containing personal data from the premises under the control of the data controller must be authorized by the data controller. This provision also applies to documents or media attached to and sent by email. The inventory of documents and media of BPO LABS S.A.S must be included as an annex to this manual.
The personnel of BPO LABS S.A.S should only access the data and resources necessary for the performance of their duties and for which they are authorized by the data controller in this manual. BPO LABS S.A.S is responsible for maintaining an updated list of users, user profiles, and authorized accesses for each of them. It also has mechanisms to prevent access to data with rights other than those authorized. In the case of computer media, this may involve the assignment of passwords, and in the case of documents, the delivery of keys or mechanisms to open storage devices where the documentation is archived. The modification of any data or information, as well as the granting, alteration, inclusion, or cancellation of authorized accesses and users listed in the updated list mentioned in the previous paragraph, is the exclusive responsibility of authorized personnel. Any external personnel authorized and legally authorized to access protected resources will be subject to the same conditions and security obligations as the internal personnel. The authorized users for accessing databases are specified in section 6 of this manual.
The storage of personal data by the data controller or data processor on portable devices and their processing outside the premises requires prior authorization from BPO LABS S.A.Sand compliance with the corresponding security guarantees for the processing of this type of data.
Temporary databases or copies of documents created for temporary or auxiliary work must comply with the same level of security as the original databases or documents. Once they are no longer needed, these temporary databases or copies must be deleted or destroyed, preventing access or recovery of the information they contain. Only the personnel authorized in section 6 are allowed to make copies or reproduce the documents.
BPO LABS S.A.S has appointed respective security officers responsible for coordinating and controlling the security measures contained in this manual. According to data protection regulations, the appointment of security officers does not exempt the data controller or data processor from liability.
Databases containing personal data processed by BPO LABS S.A.S, classified with a sensitive or private security level, must undergo an internal or external audit every year to verify compliance with the security measures contained in this manual.
Both the information systems and the data storage and processing facilities will be audited. BPO LABS S.A.S will carry out an extraordinary audit whenever substantial modifications are made to the information system that may affect compliance with the security measures, in order to verify their adaptation, suitability and the effectiveness of the same.
The audits will conclude with an audit report that will contain:
The audit reports will be attached to the Internal Security Manual and made available to the Supervisory Authority.
BPO LABS S.A.S establishes the criteria and procedures for filing documents containing personal data in accordance with the law. The filing criteria ensure the preservation, location, and consultation of documents, enabling the rights of access and claims by data subjects. These criteria and procedures are outlined in section 6 of this manual.
It is recommended that documents be filed considering criteria such as the degree of use by users with authorized access, the currency of their management and/or processing, and differentiation between historical databases and those for company administration or management. Document storage devices must have keys or other mechanisms that hinder their opening, except when the physical characteristics of the devices prevent it. In such cases, BPO LABS S.A.S will take necessary measures to prevent unauthorized access.
The devices are identified and described in section 6 of this manual. When documents containing personal data are under review or processing and, therefore, outside the storage devices, whether before or after filing, the person in charge must safeguard them and prevent unauthorized access.
Storage devices containing documents with classified sensitive security levels must be located in areas or premises with access protected by locked doors or similar mechanisms. These areas must remain closed when access to such documents is not required. If compliance with this requirement is not possible, BPO LABS S.A.S may adopt duly justified alternative measures, which will be included in this manual.
Descriptions of storage security measures are provided in section 6 of this document.
Access to documents must be carried out exclusively by authorized personnel as specified in section 6 of the manual, following the defined mechanisms and procedures. These procedures must record and retain access to documentation classified with sensitive security levels, whether by authorized users or unauthorized individuals, as reflected in the aforementioned section. The access procedure for documents containing classified sensitive data involves recording access to the documentation, the identity of the user accessing, the time of access, and the accessed documents. Access to documents with this type of data is carried out by authorized personnel; if accessed by unauthorized individuals, it must be supervised by an authorized user or the responsible security officer at BPO LABS S.A.S
BPO LABS S.A.S must install an information security system that correctly identifies and authenticates users of information systems to ensure that only authorized personnel can access databases. It must also establish a mechanism that allows personalized and unambiguous identification of any user attempting to access the information system and verifies their authorization.
Identification must be performed through a unique system for each user accessing the information, considering the username, employee identification, department name, etc. The nomenclature used for assigning usernames to access the information system and the user authentication system are described in section 6 of this document.
When the authentication system is based on password entry, a procedure for assigning, distributing, and storing passwords must be implemented to ensure their integrity and confidentiality. It is recommended that passwords have a minimum of nine characters and contain uppercase letters, lowercase letters, numbers, and letters. The password policy of BPO LABS S.A.S.
All individuals involved in the storage, processing, retrieval, or any other activity related to personal data and information systems of BPOLABS S.A.S are required to act in accordance with the functions and responsibilities outlined in this section.
BPOLABS S.A.S must inform its service personnel of the security measures and standards relevant to their duties, as well as the consequences of non-compliance, through any means of communication that ensures receipt or dissemination (email, notice boards, etc.). Likewise, the company must provide its personnel with this manual to familiarize themselves with the company's security regulations and their obligations based on their respective roles.
BPOLABS S.A.S fulfills its duty of information by including confidentiality agreements and the obligation of secrecy, where applicable, signed by the users of identification systems mentioned in item 6 regarding databases and information systems. The company also provides an informative circular to the same individuals.
The functions and obligations of the personnel at BPOLABS S.A.S are generally defined based on the type of activity they perform within the company and specifically outlined in this manual. The list of users and profiles with access to protected resources is documented in item 6 regarding databases and information systems. In general, when a user handles documents or media containing personal data, they have the responsibility to safeguard them and ensure that unauthorized individuals cannot access them.
Failure to comply with the obligations and security measures established in this manual by the personnel of BPOLABS S.A.S is subject to sanctions in accordance with the applicable regulations governing the legal relationship between the user and the company.
The functions and responsibilities of users of personal databases under the responsibility of BPOLABS S.A.S are as follows:
The databases stored and processed by BPOLABS S.A.S are listed in the following table (Table I), which indicates the security level and treatment system for each of them.
Table I. Data bases and Security level
The Following table (Table II) outlines the structure of the databases of BPOLABS S.A.S
Table II. Database Structure
BPOLABS S.A.S appoints security officers and develops specific security measures for each database. All of this is outlined in the following table (Table III).
The appointment of security officers does not exempt the data controller or data processor from their obligations.
Table III. Security officers and database security measures
BPOLABS S.A.S identifies in this manual the data processors and specifies the conditions of the processing. When there is a data transmission contract, the data processors are identified in the data transmission annex of this document. The data processors must comply with the functions and obligations related to the security measures outlined in this manual.
BPO LABS S.A.S establishes an incident notification, management, and response procedure in order to ensure the confidentiality, availability, and integrity of the information contained in the databases under its responsibility. All users, procedure managers, and any person related to the storage, processing, or querying of the databases outlined in this document must be familiar with the procedure to follow in the event of an incident.
The procedure for incident notification, management, and response is as follows:
BPO LABS S.A.S maintains an incident register that includes the type of incident, date and time of occurrence, person reporting it, person notified, effects of the incident, and corrective measures when applicable. This register is managed by the database security officer and should be included as an annex to this manual (Annex III). Additionally, procedures should be implemented for data recovery, specifying the responsible party for executing the process, the restored data, and, if applicable, any data that needed to be manually entered during the recovery process.
When necessary, any document (original, copy, or reproduction) or media containing personal data should be destroyed or erased, implementing measures to prevent unauthorized access or recovery of the information contained in the document or media. Before initiating the destruction, an acknowledgment or record will be made in a book or agenda, describing the document to be destroyed, the date, time, and signatures of the two individuals witnessing the destruction.
When physically transferring documents or media, necessary measures should be taken to prevent unauthorized access, manipulation, theft, or loss of information. The transfer of media containing personal data should be done by encrypting the information or using any other mechanism that ensures it is not tampered with or accessed.
Data contained in portable devices should be encrypted when outside the premises under the control of BPO LABS S.A.S If encryption is not possible, the processing of personal data through such devices should be avoided. However, processing may be allowed when strictly necessary, taking into account the risks and including security measures in this manual.
This manual has been approved by BPO LABS S.A.S, as the data controller, on 01/01/2023. The company accepts its content, orders its execution and compliance, for all personnel of the company in general, and particularly for those mentioned in this document.