Last update: March 2025
The purpose of this policy is to establish the general guidelines and the commitment of Management to ensure that the company properly manages the security of the information it handles.
This policy serves as the reference framework for the Information Security Management System (ISMS), based on the ISO 27001 standard, implemented at JOTELULU. It also complies with the requirements of the National Security Scheme (ENS), the French Public Health Code, and the CISPE (Cloud Infrastructure Services Providers in Europe) Code of Conduct.
This policy applies to all IT systems of JOTELULU and to all members of the organization, without exception.
All members are required to be aware of and comply with this Information Security Policy and the associated Security Regulations.
JOTELULU is a cloud services platform with a mission to simplify cloud computing, making it accessible and affordable for IT companies and, ultimately, for small and medium-sized businesses (SMBs). Its primary goal is to enhance the competitiveness of technology companies by enabling them to offer cloud services in a simple and cost-effective manner.
JOTELULU’s philosophy is based on three fundamental principles:
Additionally, JOTELULU aims to become the best cloud platform for the IT channel, offering cloud services that IT companies can market under their own brand and pricing.
In this environment, security is a fundamental pillar for JOTELULU, reflecting its commitment to data protection and business continuity. High-security standards are essential to ensuring the trust of its users and the reliability of its services.
The Information Security Policy establishes the guidelines and principles defined by JOTELULU, S.L.U. (hereinafter, JOTELULU) to ensure the protection of information, compliance with defined security objectives, and the assurance of confidentiality, integrity, and availability of information systems. Additionally, it guarantees adherence to all applicable legal obligations.
JOTELULU’s management, fully aware of the importance of information security in the workplace, commits to the following principles regarding the Information Security Management System (ISMS):
To fulfill these commitments, JOTELULU’s management will ensure that all personnel comply with the security-related regulations, policies, procedures, and instructions established within the organization.
Through the development of its Information Security Management System, JOTELULU aims to ensure the following security objectives:
In particular within the framework of the HDS (Hébergeur de Données de Santé) certification, the following specific objectives are set with regard to the health data that may be hosted by our partners:
1. Ensure the confidentiality of the health data hosted within the HDS Services, in particular implement appropriate methods, processes and policies to:
2. Ensure the availability of the health data hosed within the services, in particular:
3. Enable the Clients to use the services in an appropriate and secure manner, in particular:
Security Committee
To ensure the proper performance of the Management System and compliance with the established objectives and requirements, JOTELULU’s management has appointed an ISMS Manager and a Security Committee. The Security Committee is responsible for ensuring compliance with the guidelines set forth in this policy.
The committee is responsible for the following functions:
Roles: Functions and Responsibilities.
|
Role |
Functions |
Responsible at JOTELULU |
|
Management |
Ultimately responsible for the implementation of ENS. |
Management |
|
Information Responsible/ Responsable de la Información |
Responsible for information protection and for defining the security requirements of the processed information. |
Security Committee |
|
Service Responsible/ Responsable del Servicio |
Determines the security requirements of the provided services, according to the parameters of Annex I of ENS. |
Security Committee |
|
Security Responsible/ Responsable de la Seguridad |
Makes security-related decisions to meet the requirements established by the Information and Service Responsibles. |
Head of Security |
|
System Responsible/ Responsable del Sistema |
Responsible for the operation of the information system, ensuring compliance with the security measures set by the Security Responsible. |
Head of Operations |
|
Personal Data JOTELULU processes personal data, which is documented in the Register of Processing Activities (RAT): All information systems must comply with the security levels required by regulations according to the nature and purpose of the collected personal data. |
||
|
Data Controller |
The natural or legal person, public authority, agency, or other body that, alone or jointly with others, determines the purposes and means of processing. |
As indicated in the RAT |
|
Data Processor |
The natural or legal person, public authority, agency, or other body that processes personal data on behalf of the Data Controller. |
As indicated in the RAT |
|
Data Protection Officer (DPO) |
Ensures compliance with data protection regulations and acts as a liaison with supervisory authorities. |
DPO |
Conflicts between individuals, units, or governing bodies within the organizational structure of the Information Security Policy will be resolved by the common hierarchical superior, who may consult the Information Security Committee beforehand.
In case of conflict, the decisions of the Information Security Committee will take precedence.
Designation Procedure
The role of Information Security Manager will be assigned to the CISO/Head of Security. If the position becomes vacant, a new appointment will be proposed by the Security Committee.
The role of System Manager will be assigned to the Head of Operations. If the position becomes vacant, a new appointment will be proposed by the Security Committee from within the Engineering, Operations, or Infrastructure departments.
This regulatory framework will be reviewed at least once a year in collaboration with the legal department or whenever a significant change is published in the BOE, regional bulletins, official government websites, or in response to relevant alerts.
All systems subject to this policy must undergo a risk analysis, assessing the threats and risks to which they are exposed. This analysis will be repeated:
To ensure consistency in risk analyses, a reference assessment is established for the different types of information handled and services provided. The Security Committee will facilitate the allocation of resources to meet the security needs of various systems, promoting horizontal investments.
The Information Security Policy is structured into the following hierarchically related levels:
The Information Security Policy, along with the processes of the Management System, is regularly reviewed at planned intervals or whenever significant changes occur to ensure its continued suitability, effectiveness, and efficiency. In general, it is reviewed annually as part of the internal ISMS audit process.
Monitoring procedures are in place to provide insights into the proper performance of the ISMS.
Management also plays a key role in reviewing the system, conducting an in-depth analysis to identify potential improvements and deficiencies.
The management system policy is communicated at the time of onboarding, during awareness training, and internally through email and/or corporate channels.
The statement of this policy will be made available to external stakeholders of JOTELULU by publishing it in a shared document on the web.
This policy will be implemented through Security Specific Topics that address specific aspects of security. These regulations are available to all members of the organization, particularly those who use, operate, or manage information and communication systems.