Skip to main content

General notice

We are committed to the confidentiality, integrity and availability of information in all the activities we carry out to secure the information of our customers, flyers, users, human talent, suppliers and shareholders through the Information Security Management System and the Corporate Information Security Policy

Establishes the commitment of Aerovías del Continente Americano SA. Avianca, Avianca Ecuador S.A., Avianca Rica S.A., Aviateca S.A., Regional Express Américas S.A.S. and Taca International Airlines S.A. with the management of information security, through:

  • The implementation of international standards, legal and organizational requirements, and information security controls that make it possible to manage risks that may affect the confidentiality, integrity, availability and privacy of information, and compliance with the information security objectives.
  • Promote the culture and continuous improvement of information security among collaborators (direct or subcontracted) and related third parties (suppliers or contractors).

The objectives of the Information Security Management System are detailed below:

  • Information protection: Strengthen the protection of the organization's information considering risks, security, compliance and continuity of processes and technology.
  • Identity and access management: Optimize access management times to critical systems.
  • Business continuity: Strengthen the business continuity program and disaster recovery plan in the organization.
  • Vulnerability management: Ensure compliance with the vulnerability policy to secure the organization's systems.

1. PURPOSE AND SCOPE


1.1 Purpose

This policy seeks to establish the information security and cybersecurity guidelines required for the protection of the information of Investment Vehicle 1 Limited (the “Company”) and any of its subsidiaries (with the Company the “Organization”), against situations that may affect the Confidentiality, Integrity and Availability (as defined below) of the information of the Organization and that may cause financial, legal, competitive and/or reputational impact on the Organization (the “Policy”).

1.2 Scope

The scope includes all the information and valuable resources (Information and Communications Technologies -ICTs-, Facilities, and Operational Technologies -OTs-) associated to or that belongs to the Organization or that is managed by third parties (suppliers and contractors), regardless of the format, medium, in all its forms (digital, handwritten, spoken, printed), presentation and/or place where it is located, including cyberspace.

2. RESPONSIBILITIES

The Risk and Information Compliance Department, is the area responsible for formulating the Policy, disclosing it, reviewing it at least once a year and keeping it updated; monitoring that it is complied with, in accordance with the mission and vision of the Organization, and compliance with the regulations applicable to the Organization, reporting to the Audit Committee of the Company (the "Audit Committee") the relevant matters on information security and cybersecurity.

In the governance of Information Security and Cybersecurity, different instances participate in tall the companies described in the scope, which have the following responsibilities:

2.1. Policy approval

The Audit Committee is responsible for ratifying this policy and its updates, monitoring the information risk profile, promoting the culture of information security and cybersecurity, encouraging compliance with its guidelines, allocating resources for compliance, as well as generally monitoring compliance with this Policy.

The Risk and Information Compliance Department has the authority to manage the review of the Policy and its submission to the Audit Committee for its ratification.

2.2. Information Risk and Compliance Department functions

  • Define the scope of the Information Security and Cybersecurity program that seeks to protect the Confidentiality, Integrity and Availability of the Organizations information, ensuring regulatory compliance and implementing best practices and methodologies of recognized technical value applicable to the industry.
  • To promote the effective management of cyber and information security risks, through the identification, analysis, evaluation, and treatment of these risks.
  • Define processes for the permanent updating of new developments in the regulatory frameworks related to Information Security and Cybersecurity.
  • Support the response to information security and cybersecurity incidents identified by employees, related third parties and derived from the monitoring done through the information security management platforms that affect the processes, technological resources and systems of the Organization.
  • Define a technology recovery management program to ensure the availability and continuity of critical business functions in the event of interruptions.
  • With the support of the Legal Department, monitor the level of compliance with applicable laws and regulations on Information Security and Cybersecurity.
  • Monitor compliance with the Information Security and Cybersecurity program, in accordance with the Organization's mission and vision, and compliance with the regulations applicable to each of its companies.
  • Through the Legal Department, establish and maintain contacts with authorities, special or interest groups relevant to information security and cybersecurity.
  • Support the Organization in actions for the implementation of measures or controls for compliance with this policy.

2.3. The Organization, its officers, directors, employees (direct or outsourced) and related third parties (suppliers and contractors) who have access to the Organization's information, whether on a regular or occasional basis, in the performance of their duties, are responsible for:

  • The knowledge and compliance with the Policy.
  • The implementation of the Policy along with any manual, procedure or instruction established for the implementation of it.
  • Assuming the risk management of handling the Organization’s information and the implementation of pertinent actions for its mitigation.
  • Considering information security and cybersecurity requirements in its processes, initiatives, projects and contracting.
  • Identifying and reporting to the Information Risk and Compliance Department potential events or incidents that threaten or might have the ability to risk compliance with information security policies and/or procedures.
  • Follow up on the level of compliance with applicable laws and regulations on information security and cybersecurity.
  • Using the Organization information resources responsibly and only for authorized purposes.
  • Identify and alert the Information Risk and Compliance Department of current and emerging cyber threats and cyber risks that may affect the Organization.
  • Complying with the Organization's practices for the use of secret authentication information (passwords, access codes, MFA) and assignment of minimum privileges for access to information in its different media.
  • Process leaders must ensure that processes comply with the principle of Segregation of Duties, in order to minimize the risk of concentrating critical responsibilities in a single person.

3. CONTENT

General and specific aspects of the Policy.

3.1 The Organization recognizes that information is an indispensable input for the execution of processes, decision making in the development of business objectives and for the design and definition of the products and services that constitute the differentiating factor of what we are to our customers, collaborators and associates. It also recognizes the importance of preventing information security and cybersecurity risks throughout their lifecycle; such protection is framed by 3 properties:

  • Confidentiality: The information must not be made available or disclosed to unauthorized individuals, entities or in unauthorized processes.
  • Integrity: The accuracy, reliability and completeness of the information must be preserved.
  • Availability: The information must be accessible and usable when requested by an authorized individual, area or process and at the time it is required.

3.2 The information and valuable resources associated with the information that the Organization uses for the development of its business objectives must be identified; the information and other associated resources must have a responsible person assigned to them, who must make the decisions that are pertinent for their protection, in accordance with the internal requirements and regulations applicable to each company.

3.3 All information, regardless of the medium in which it is found or the location from which it is accessed, must be classified to establish its sensitivity (the level of reserve that must be maintained on its content) and its criticality (the level of availability required so that business operations are not interrupted). It is the responsibility of the members of the Organization to know the classification of the information they use for the development of their activities; and of those responsible for the processes to define the controls to protect the information according to the classification handled by each Company that is part of the Organization.

3.4 The Organization identifies as confidential or privileged information, the following information, among other, as the definition of confidential information must be made on case by case basis:

  • Stock exchange shares, strategic and financial information, information on strategic alliances, reports on projections, results and/or financial disclosures.
  • Information related to clients, collaborators, shareholders, related third parties, contractors, suppliers, travelers, users, investors.
  • Insider information for important and confidential company events.
  • Material non-public information. These are some examples, merger information, strategic projects, disposal, change in dividend policy, business partner information, shareholders information, among other.
  • Business information that the organization is obligated to protect, patents, inventions, commercial agreements, contracts, software development source code or other information that has the potential to provide competitive advantage.
  • Practices to optimize revenues, prices, net fares.
  • Information on the operation and its associated processes.
  • Security reporting, risk, compliance, internal and external audit, incidents operational, information security and cybersecurity incidents, investigations, and legal matters regarding any of the above.
  • Reports from or to regulatory agencies regarding confidential information.
  • Passwords.
  • Information subject to personal data protection laws (including payment card data) in the various jurisdictions where the Organization is located or develops its business.

The aforementioned information, and any other that is considered due to its classification as confidential or privilege information may not be used for the personal benefit of any administrator, collaborator or third party that has access to, or for any purpose other than that originally intended for such information.

3.5 It is the duty of all those responsible for processes, project or initiative leaders and contract managers to ensure that information risks are identified, analyzed, evaluated, treated and monitored, in accordance with the procedures of the Information Risk and Compliance Department, ensuring that the corresponding risks are kept within the risk levels acceptable to the Organization as stipulated in the following link: MA_AVSG04_054 INFORMATION RISK MANAGEMENT MANUAL

3.6 Information resources such as: equipment, business applications, Internet services, Intranet, collaborative tools (e-mail, chat, cloud storage), among others, are provided to all employees of the Organization for the exclusive use of the Organization. Access to and use of these resources must be authorized by the person responsible for each resource and in accordance with the responsibilities of his or her function.

3.7 The Organization must ensure that its employees, any officer, manager or any person in charge of information management processes implement information security measures such as, but not limited to: checks and investigations on personal references, work references, work experience, complementary tests, security survey, aptitude and knowledge test, in a manner that supports security policies and in compliance with local regulations.

3.8 All employees and related third parties undertake to handle the confidentiality of the Organization's information regardless of whether they have signed a confidentiality agreement at the time they join the Organization and are responsible for the confidentiality of the information even after the end of their relationship with the Organization.

3.9 The Organization shall have a permanent information security and cybersecurity culture program to keep all its personnel informed about policies, information security responsibilities and the continuous threats that put the information it manages and/or processes at risk.

3.10 Those responsible for contracts and contracting should ensure that the information security responsibilities of third parties who access, process, store or distribute information of value to the Organization are documented in contracts or other service delivery agreements and should monitor compliance throughout the completeness of the term of the contractual relationship.

3.11 It is the duty of all The Organization and related third parties to report any suspicion, abnormal condition or violation of the policies, responsibilities and procedures of information security and cybersecurity that threaten the Confidentiality, Integrity and Availability of The Organization's information immediately through the channels established by the Organization.
In the event that the situations described above affect or have the possibility of affecting or having any economical, material, reputational, legal or operational impact for the Organization, they must be reported immediately to the Information Risk and Compliance Department through the channels established by the latter.

The Information Risk and Compliance Department shall evaluate the incident reports and determine whether they meet the materiality criteria, in which case it shall inform the Investor Relations Department so that it complies with the Policy on Disclosure of Relevant Financial and Non-Financial Information to Shareholders, Market, Stakeholders and Interested Third Parties.

3.12 The Organization has the responsibility of implementing technical measures for the protection of information that is stored, processed, or transmitted; according to its classification and considering, but not limited to:

  • Information risk management
  • Identification and classification of information assets
  • Controls for secure data storage and transfer.
  • Protection against threats, such as malware and/or possible computer attacks.
  • Access control to information, applications, infrastructure and networks.
  • Security management in own or personal mobile/laptop devices at the service of the Organization.
  • Proper use of resources allocated by the organization (internet, computers).
  • Network and telecommunications security
  • Security in the acquisition, development and maintenance of technological resources (including systems and processing environments).
  • Removable storage media management
  • Safety of internal personnel and third parties
  • Technical vulnerability management
  • Cloud Security
  • Security logs, events and incidents management
  • Physical and Environmental Security of Data Processing Centers
  • Software installation controls
  • Information backup and recovery of technological platforms in case of disasters.

3.13 The Information Risk Department may carry out monitoring activities in any Company of the Organization, on an exclusive basis, to determine the level of compliance with the guidelines established in this Policy.

Current legal regulation applicable to the policy.

3.14 The Organization, its Board of Directors and its executive group must commit to the compliance with the information security requirements established in its internal security policies, as well as those requested by the applicable laws and regulations, such as and without limitation: SOX (Sarbanes-Oxley Act), PCI DSS (Payment Card Industry Data Security Standards), international personal data protection laws, aviation sector regulations, industry or contractual agreements, licensing, intellectual property and others related to information security and cybersecurity.

3.15 In case of non-compliance with the established or subsequent security policy and/or procedures, the Organization will take the appropriate legal, administrative and/or disciplinary actions, in accordance with the provisions of the internal regulations of each of its companies and/or the applicable international and/or local information security, cybersecurity and personal data protection laws and regulations.

Effective date of the Policy.

3.16 This Policy is effective from the moment of its publication and is understood to be in force indefinitely unless it is modified or update in accordance with changes in the organizational environment, business circumstances and/or legal conditions. Regarding third parties where the approval of a corporate body is required for its adoption or the consent of a third party, the policy will come into effect when the respective authorizations are obtained.

Prevalence.

3.17 In case of conflict between the Board Protocol, the Investment Agreement and this Policy, the following will be the order of precedence of the documents: (i) the Investment Agreement, (ii) the Board Protocol, (iii) this Policy.

Cybersecurity tips

Your information has value, be prepared to face any risk situation that puts your data at risk. Learn how to browse safely:

Phishing attacks

Cyberattack used to obtain confidential information by deceiving users through false digital platforms or impersonating identities

Scams on social networks

This cyberattack usually uses strategies to get you to make transfers or hand over credit card information and passwords in the name of avianca

Be careful! 

Doubt all messages or publications on pages in the name of avianca that request confidential information

Have you been a victim or suspect of a cyberattack?
Any questions? Get answers from our Help Center.