1. Mission and Objectives

SPHERAG’s Management, aware of the commitment made to its clients and the importance of comprehensive security, has established an Information Security Management System within its organization based on Royal Decree 311/2022, of May 3, which regulates the National Security Framework, addressing the following objectives:

2. Scope

SPHERAG will apply this Information Security Policy to systems related to the development of applications used within its activities.

Specifically, this Security Policy applies to ICT and the information system associated with activities related to creating IoT solutions for irrigation system control, according to the current statement of applicability.

The organization excludes the application of this Information Security Policy to information systems not reflected in this section.

3. Regulatory Framework

4. Roles and Responsibilities

The Information Owner is responsible for the data and will have the following duties:

The Service Owner will define the requirements for the services provided and will have the following duties:

The Security Officer will be responsible for making appropriate decisions to meet the information and service security requirements. Duties include:

The System Owner, within their area of responsibility, will perform the following functions:

The Information Security Committee, which spans the entire company, serves as the coordination and conflict resolution body. Its functions include:

The overall responsibility for information security lies with the Security Officer, with final accountability resting with the Information Security Committee and the senior management of SPHERAG as the highest authority in the Information Security Management System. The composition and duties of the Committee are outlined in its official meeting records.

SPHERAG management is responsible for appointing the:

Appointments will be reviewed every two years or when any position becomes vacant.

In the event of a conflict between roles, it will be resolved by their direct supervisor, or failing that, the Security Officer’s decision will prevail.

By this statement, SPHERAG’s management assumes ultimate responsibility for compliance with this policy.

5. Policy Review

The Information Security Committee is responsible for annually reviewing this Information Security Policy and proposing updates or continuation. The policy must be approved by Management and communicated to all relevant stakeholders.

6. Personal Data

SPHERAG will only collect personal data that is appropriate, relevant, and not excessive, in relation to the purposes for which it was collected. Technical and organizational measures will be adopted to comply with applicable data protection regulations.

With the General Data Protection Regulation (EU) 2016/679 (GDPR) effective from May 25, 2018, and its incorporation into Spanish law via Organic Law 3/2018 of December 5, measures such as the legal legitimacy analysis of data processing, risk analysis, impact assessments (if high risk), activity records, and appointment of a Data Protection Officer (DPO) have been implemented.

SPHERAG must ensure compliance with its established data protection policy.

7. Risk Management

All systems subject to this policy must undergo a risk analysis to evaluate threats and vulnerabilities. This analysis must be repeated:

To standardize risk assessments, the Information Security Committee will define baseline values for different types of data and services. The committee will also promote resource availability and horizontal security investments.

8. Staff Obligations

Each user of SPHERAG’s information systems is responsible for protecting information assets through correct usage, in line with their professional and academic roles.

All SPHERAG members are required to know and comply with this Information Security Policy and related regulations. The Information Security Committee will ensure this information reaches all relevant parties.

All staff will receive information security training. A continuous awareness program will be established, especially targeting new hires.

Personnel responsible for using, operating, or managing ICT systems will receive training appropriate to their responsibilities. This training is mandatory before assuming new roles or job changes.

Failure to comply with this Information Security Policy may result in disciplinary measures, without prejudice to any applicable legal actions.

9. Third Parties

When SPHERAG provides services to or manages information for third-party entities, those parties will be informed of this Information Security Policy. Coordination channels and incident response procedures will be established with their respective Information Security Committees.

When SPHERAG uses third-party services or shares information with them, those third parties will also be made aware of this policy and related regulations. They will be required to comply with its provisions and may implement their own procedures to ensure compliance. Incident response protocols and awareness programs will be established to ensure third-party staff meet SPHERAG’s security standards.

If a third party cannot comply with any part of this policy, a Security Officer’s report detailing the associated risks and mitigation measures will be required. Approval from the relevant Information and Service Owners must be obtained before proceeding.

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.