24.01.2013 Views

Amadeus IT Holding, S.A. and Subsidiaries - Investor relations at ...

Amadeus IT Holding, S.A. and Subsidiaries - Investor relations at ...

Amadeus IT Holding, S.A. and Subsidiaries - Investor relations at ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Systems change control<br />

Control policies <strong>and</strong> procedures provide reasonable assurance th<strong>at</strong>:<br />

• changes to the <strong>Amadeus</strong> System’s applic<strong>at</strong>ion software are properly authorized,<br />

tested, approved, implemented <strong>and</strong> documented.<br />

• programs <strong>and</strong> systems changes are appropri<strong>at</strong>ely managed to minimize the<br />

likelihood of disruption, unauthorized alter<strong>at</strong>ions <strong>and</strong> errors which impact the<br />

accur<strong>at</strong>e, complete, <strong>and</strong> valid processing <strong>and</strong> recording of financial inform<strong>at</strong>ion.<br />

Disaster recovery plan<br />

Control policies <strong>and</strong> procedures provide reasonable assurance th<strong>at</strong> recovery plans are<br />

documented <strong>and</strong> consistently tested.<br />

Security Security policies<br />

policies<br />

The Company has implemented the following policies th<strong>at</strong> have been communic<strong>at</strong>ed to all<br />

employees <strong>and</strong> published in the Group’s intranet:<br />

• Inform<strong>at</strong>ion classific<strong>at</strong>ion<br />

• Guidelines for appropri<strong>at</strong>e use of systems <strong>and</strong> financial inform<strong>at</strong>ion<br />

• User management procedures<br />

• Incident management procedures<br />

Internal control over inform<strong>at</strong>ion systems policies are overseen by the Corpor<strong>at</strong>e Inform<strong>at</strong>ion<br />

Security Area. Its mission is to propose, make advertising, implement, maintain <strong>and</strong> control a<br />

security management framework to mitig<strong>at</strong>e the risk of compromising the assets of <strong>Amadeus</strong><br />

affecting the availability, confidentiality <strong>and</strong> integrity of the services <strong>and</strong> d<strong>at</strong>a from <strong>Amadeus</strong>,<br />

the corpor<strong>at</strong>e image or the br<strong>and</strong> of <strong>Amadeus</strong>. This security management framework applies<br />

to all <strong>Amadeus</strong> companies. It is based on best industry practices <strong>and</strong> covers organiz<strong>at</strong>ional,<br />

political security measures of security <strong>and</strong> st<strong>and</strong>ards as well as methodologies for risk<br />

management.<br />

The Executive Committee of <strong>Amadeus</strong> has issued a Global st<strong>at</strong>ement on security of<br />

inform<strong>at</strong>ion: OASIS (Overall St<strong>at</strong>ement on Inform<strong>at</strong>ion Security). This st<strong>at</strong>ement emphasizes<br />

the commitment of top management to establish, implement, oper<strong>at</strong>e <strong>and</strong> continually improve<br />

a System of Inform<strong>at</strong>ion Security Control to <strong>Amadeus</strong> based on:<br />

• the principles of inform<strong>at</strong>ion security,<br />

• best practices on inform<strong>at</strong>ion security control as it was described in ISO/lEC 27002,<br />

• the requirements for the System of Inform<strong>at</strong>ion Security Control as they were<br />

described in ISO/lEC 27001.<br />

The Director of the Corpor<strong>at</strong>e Inform<strong>at</strong>ion Security Area (Inform<strong>at</strong>ion Technology <strong>and</strong><br />

Services- <strong>IT</strong>S) is responsible for the overall implement<strong>at</strong>ion of the System of Inform<strong>at</strong>ion<br />

Security Control of <strong>Amadeus</strong>. This includes a regular review of the System of Inform<strong>at</strong>ion<br />

Security Control policy of <strong>Amadeus</strong> <strong>and</strong> the security controls implemented by <strong>Amadeus</strong>.<br />

The corpor<strong>at</strong>e inform<strong>at</strong>ion security deleg<strong>at</strong>es carry out <strong>IT</strong> security audits on a regular basis, as<br />

well as on dem<strong>and</strong> audits.<br />

There are Access Control policies based on the main principle of security based on the need<br />

to know. There are policies <strong>and</strong> procedures for the management of identity for the applic<strong>at</strong>ion<br />

of the system, aimed <strong>at</strong> the beginning of functions <strong>and</strong> roles-based access control.<br />

Segreg<strong>at</strong>ion of duties analysis <strong>and</strong> audits are executed on system applic<strong>at</strong>ions.<br />

3.3. Internal control policies <strong>and</strong> procedures for overseeing the management of outsourced<br />

activities, <strong>and</strong> of the appraisal, calcul<strong>at</strong>ion or valu<strong>at</strong>ion services commissioned from<br />

independent experts, when these may m<strong>at</strong>erially affect the financial st<strong>at</strong>ements.<br />

Internal Internal Control Control over over outsourced outsourced activities<br />

activities<br />

The Group has a common framework with the requirements for outsourcing activities.<br />

For all outsourced processes, Service Level Agreements (SLA) have to be defined, agreed<br />

<strong>and</strong> signed in the contract with the vendor.<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!