title
Information security policy
description
We recognize the importance of the security, privacy and confidentiality of your personal information.
imageDesktop

General notice

We are committed to the confidentiality, integrity and availability of information in all the activities we carry out to secure the information of our customers, flyers, users, human talent, suppliers and shareholders through the Information Security Management System and the Corporate Information Security Policy

information-security-policy-accordion-1
multiple
none

Establishes the commitment of Aerovías del Continente Americano SA. Avianca, Avianca Ecuador S.A., Avianca Rica S.A., Aviateca S.A., Regional Express Américas S.A.S. and Taca International Airlines S.A. with the management of information security, through:

The objectives of the Information Security Management System are detailed below:

1. PURPOSE AND SCOPE


1.1 Purpose

This policy seeks to establish the information security and cybersecurity guidelines required for the protection of the information of Investment Vehicle 1 Limited (the “Company”) and any of its subsidiaries (with the Company the “Organization”), against situations that may affect the Confidentiality, Integrity and Availability (as defined below) of the information of the Organization and that may cause financial, legal, competitive and/or reputational impact on the Organization (the “Policy”).

1.2 Scope

The scope includes all the information and valuable resources (Information and Communications Technologies -ICTs-, Facilities, and Operational Technologies -OTs-) associated to or that belongs to the Organization or that is managed by third parties (suppliers and contractors), regardless of the format, medium, in all its forms (digital, handwritten, spoken, printed), presentation and/or place where it is located, including cyberspace.

2. RESPONSIBILITIES

The Risk and Information Compliance Department, is the area responsible for formulating the Policy, disclosing it, reviewing it at least once a year and keeping it updated; monitoring that it is complied with, in accordance with the mission and vision of the Organization, and compliance with the regulations applicable to the Organization.

2.1. Policy approval

The Audit Committee is responsible for ratifying this policy and its updates, monitoring the information risk profile, promoting the culture of information security and cybersecurity, encouraging compliance with its guidelines, allocating resources for compliance, as well as generally monitoring compliance with this Policy.

2.2. Information Risk and Compliance Department functions

2.3. The Organization, its officers, directors, employees (direct or outsourced) and related third parties (suppliers and contractors) who have access to the Organization's information, whether on a regular or occasional basis, in the performance of their duties, are responsible for:

3. CONTENT

General and specific aspects of the Policy.

3.1 The Organization recognizes that information is an indispensable input for the execution of processes, decision making in the development of business objectives and for the design and definition of the products and services that constitute the differentiating factor of what we are to our customers, collaborators and associates. It also recognizes the importance of preventing information security and cybersecurity risks throughout their lifecycle; such protection is framed by 3 properties:

3.2 The information and valuable resources associated with the information that the Organization uses for the development of its business objectives must be identified; the information and other associated resources must have a responsible person assigned to them, who must make the decisions that are pertinent for their protection, in accordance with the internal requirements and regulations applicable to each company.

3.3 All information, regardless of the medium in which it is found or the location from which it is accessed, must be classified to establish its sensitivity (the level of reserve that must be maintained on its content) and its criticality (the level of availability required so that business operations are not interrupted). It is the responsibility of the members of the Organization to know the classification of the information they use for the development of their activities; and of those responsible for the processes to define the controls to protect the information according to the classification handled by each Company that is part of the Organization.

3.4 The Organization identifies as confidential or privileged information, the following information, among other, as the definition of confidential information must be made on case by case basis:

The aforementioned information, and any other that is considered due to its classification as confidential or privilege information may not be used for the personal benefit of any administrator, collaborator or third party that has access to, or for any purpose other than that originally intended for such information.

3.5 It is the duty of all those responsible for processes, project or initiative leaders and contract managers to ensure that information risks are identified, analyzed, evaluated, treated and monitored, in accordance with the procedures of the Information Risk and Compliance Department, ensuring that the corresponding risks are kept within the risk levels acceptable to the Organization.

3.6 Information resources such as: equipment, business applications, Internet services, Intranet, collaborative tools (e-mail, chat, cloud storage), among others, are provided to all employees of the Organization for the exclusive use of the Organization. Access to and use of these resources must be authorized by the person responsible for each resource and in accordance with the responsibilities of his or her function. Information resources must be returned immediately to the administrator when they are no longer needed.

3.7 The Organization must ensure that its employees, any officer, manager or any person in charge of information management processes implement information security measures such as, but not limited to: checks and investigations on personal references, work references, work experience, complementary tests, security survey, aptitude and knowledge test, in a manner that supports security policies and in compliance with local regulations.

3.8 All employees and related third parties undertake to handle the confidentiality of the Organization's information regardless of whether they have signed a confidentiality agreement at the time they join the Organization and are responsible for the confidentiality of the information even after the end of their relationship with the Organization.

3.9 The Organization shall have a permanent information security and cybersecurity culture program to keep all its personnel informed about policies, information security responsibilities and the continuous threats that put the information it manages and/or processes at risk.

3.10 Those responsible for contracts and contracting should ensure that the information security responsibilities of third parties and their supply chain who access, process, store or distribute information of value to the Organization are documented in contracts or other service delivery agreements and should monitor compliance throughout the completeness of the term of the contractual relationship.

3.11 It is the duty of all The Organization and related third parties to report any suspicion, abnormal condition or violation of the policies, responsibilities and procedures of information security and cybersecurity that threaten the Confidentiality, Integrity and Availability of The Organization's information immediately through the channels established by the Organization.
In the event that the situations described above affect or have the possibility of affecting or having any economical, material, reputational, legal or operational impact for the Organization, they must be reported immediately to the Information Risk and Compliance Department through the channels established by the latter.

The Information Risk and Compliance Department shall evaluate the incident reports and determine whether they meet the materiality criteria, in which case it shall inform the Investor Relations Department so that it complies with the Policy on Disclosure of Relevant Financial and Non-Financial Information to Shareholders, Market, Stakeholders and Interested Third Parties.

3.12 The Organization has the responsibility of implementing technical measures for the protection of information that is stored, processed, or transmitted; according to its classification and considering, but not limited to:

3.13 The Information Risk Department may carry out monitoring activities in any Company of the Organization, on an exclusive basis, to determine the level of compliance with the guidelines established in this Policy. Including third parties and subcontracted companies that provide management, monitoring, and administration services for Investment Vehicle 1 Limited technology platforms.

Current legal regulation applicable to the policy.

3.14 The Organization, its Board of Directors and its executive group must commit to the compliance with the information security requirements established in its internal security policies, as well as those requested by the applicable laws and regulations, such as and without limitation: SOX (Sarbanes-Oxley Act), PCI DSS (Payment Card Industry Data Security Standards), international personal data protection laws, aviation sector regulations, industry or contractual agreements, licensing, intellectual property and others related to information security and cybersecurity.

3.15 In case of non-compliance with the established or subsequent security policy and/or procedures, the Organization will take the appropriate legal, administrative and/or disciplinary actions, in accordance with the provisions of the internal regulations of each of its companies and/or the applicable international and/or local information security, cybersecurity and personal data protection laws and regulations.

Cybersecurity tips

Your information has value, be prepared to face any risk situation that puts your data at risk. Learn how to browse safely:

horizontal
lazy
Recognize any threats
Recognize any threats
Try to use personal computers and be very cautious when browsing. If you have any questions, do not enter or provide your information.
none
Learn to protect your data
Learn to protect your data
Avoid using public wifi networks, use strong passwords with two-factor authentication to safeguard your information from cyber threats.
none

Phishing attacks

Cyberattack used to obtain confidential information by deceiving users through false digital platforms or impersonating identities

vertical
lazy
What is phishing?
What is phishing?
It is a form of cyberattack that seeks to obtain confidential information from individuals, such as passwords, credit card numbers, or other personal information.
none
How to recognize it?
How to recognize it?
If you receive any notification requesting your bank details to make an update, claim a refund, or verify a payment, doubt it immediately! You could be facing a phishing attempt.
none
vertical
lazy
How to protect yourself?
How to protect yourself?
Before clicking any link, verify that the email sender is real, that the website has a secure connection by identifying the padlock and that its address begins with https://
none
How to avoid it?
How to avoid it?
Do not give out personal or financial information through unofficial or unverified digital channels. Confirm the notification by calling the hotlines and ensure its veracity.
none

Scams on social networks

This cyberattack usually uses strategies to get you to make transfers or hand over credit card information and passwords in the name of avianca

horizontal
lazy
Websites that resemble those of avianca (Facebook, Instagram or X) and send links through publications or chats offering false promotions and giveaways so that you can provide confidential information.
none
False job offers in the name of avianca with the aim of requesting unauthorized money transfers. Remember that our jobs are published on official channels and on the website in the "Work with us" section.
none

Be careful!

Doubt all messages or publications on pages in the name of avianca that request confidential information

vertical
lazy
How to recognize it?
How to recognize it?
If you receive a direct message on social media or see a suspicious post asking for a quick transfer or your payment information, it’s a scam!
none
How to protect yourself?
How to protect yourself?
Do not have any interaction without first verifying that they are indeed the official and verified social media accounts of avianca.
none
How to avoid it?
How to avoid it?
Do not provide any information or make any bank transfer without verifying the information on our official social media channels or on our website.
none
<div><div style="font-size: 20px;">Have you been a victim or suspect of a cyberattack?</div></div>
Contact us
primary
internal
/en/about-us/contact-us/
_blank
informative
Any questions? Get answers from our Help Center.
false
300
24px
24px
Back to top
true