AI Terminal

MODULE: AI_ANALYST
Interactive Q&A, Risk Assessment, Summarization
MODULE: DATA_EXTRACT
Excel Export, XBRL Parsing, Table Digitization
MODULE: PEER_COMP
Sector Benchmarking, Sentiment Analysis
SYSTEM ACCESS LOCKED
Authenticate / Register Log In

Redcare Pharmacy N.V.

Governance Information Aug 8, 2023

6219_cgr_2023-08-08_08c2e69e-b7b4-4663-8ba6-6336659000dd.pdf

Governance Information

Open in Viewer

Opens in native device viewer

S Redcare PHARMACY

INFORMATION SECURITY PRACTICES

for Redcare Pharmacy N.V.

Date | 12.07.2023 Version | 4.0 Confidentiality level | Public

Contents

1. Introduction
2. Information security strategy and objectives
3. Responsibilities and accountabilities
4. Certifications and standards
5. Relevant corporate security policies and procedures
6. Physical and environmental security and technical access control
7. Cyber security measures and audits
8. Data protection and security
9. Handling of data protection and privacy breaches
10. Customer data and consumer rights
10.1. The right to be informed
10.2. The right to access
10.3. The right to rectification
10.4. The right to erasure (also known as 'the right to be forgotten')
10.5. The right to restrict processing
10.6. The right to data portability
10.7. The right to object
10.8. Rights related to automated decision-making including profiling 8
11. Human resources security and trainings
11.1.Confidentiality
11.2. Data protection and cybersecurity training
11.3.
11.4.
12. Sub-contractors

1. Introduction

Redcare Pharmacy N.V. is a multinational company committed to ensure the protection of confidential information & personal data. As a group of companies which are operating in the health sector, we are bound to strict laws and regulations. We acknowledge that we process sensitive customer data and information about our customers that needs to be well protected and therefore we take data security and data privacy very seriously. Redcare Pharmacy recognizes the importance of implementing appropriate technical and organizational security measures in order to prevent any unauthorized access, disclosure, alteration or destruction of such data. For this purpose, Redcare Pharmacy implements industry standard security controls.

This document is not meant to be the Redcare Pharmacy Security Policy but only serves as a summary of the information security measures implemented for specific business activities.

Redcare Pharmacy security measures follow a risk-based approach and embrace the principles of privacy and security by design.

All measures described hereinafter apply to Redcare Pharmacy and all related companies and subsidiaries.

2. Information security strategy and objectives

Redcare Pharmacy's information security strategy aims to achieve the highest possible level of security with the most economical use of resources and the minimization of any remaining risks.

The information security strategy is intended to define, manage, control, maintain and further develop procedures to ensure information security. To further optimize this continuous process, a company-wide information security management system (ISMS), based on the ISO 27001 standard, was developed and implemented. Redcare Pharmacy's ISMS was initially audited by TUV Rheinland in December 2021, resulting in initial certification without conditions in January 2022.

For Redcare Pharmacy, the following information security objectives are established based on the ISO27001 standard, among other, company specific security objectives:

Availability

Systems, applications and data should always be available to authorized individuals as intended.

Confidentiality

Information must always be protected from unauthorized disclosure. Confidential data and information should only be available to a limited, well-defined, authorized group of people.

Integrity

The correctness of data and the correct functioning of systems should always be ensured. The physical and logical integrity of systems, applications and data should be maintained at all times. This also includes the prevention of unauthorized creation or modification of information.

3. Responsibilities and accountabilities

Operational responsibility and approvals

IT-Governance & Compliance is currently responsible for operational activities in the area of information security, including data protection and the development and maintenance of the company's internal ISMS. All operational activities are approved and led by our Information Security Officer who directly reports to the Executive Management.

Guidance

Members of the Senior Management hold a supportive function. Should guidance on operational orientation be required, such guidance can be obtained from the responsible member of Senior Management, the Executive Director IT-Operations & Infrastructure. In the case of legal issues, the Legal Counsel is to be consulted.

Strategic orientation

The responsible member of the Board/Executive Management, the Chief Information Officer, is responsible for the strategic objectives and the definition of the overall strategy of the company in the area of information security and data protection.

The Board/Executive Management is constantly in close contact with the operationally responsible employees as well as with the members of the senior management. Monthly meetings guarantee the constant involvement of the executive management.

4. Certifications and standards

The following certifications and standards have already been obtained or implemented by Redcare Pharmacy:

  • Information Security Management System ISO/IEC 27001:2013

  • Quality management ISO 9001:2015

  • Payment Card Industry Data Security Standard (PCI DSS)

  • Guidelines on Good Distribution practice of medicinal products for human use (GDP)

  • Respecting OWASP Secure Coding Practices

  • General Data Protection Regulation (GDPR)

  • IT-Control Framework based on ITIL and COBIT

5. Relevant corporate security policies and procedures

The main policies and procedures are listed subsequently, further operational guidelines are in place.

  • Information security policy

  • Business resumption plan
  • IT emergency plan
  • Incident management process

  • Security breach notification process

  • ▶ Privacy breach notification process
  • Encryption policy
  • Secure Coding Guideline

  • Adequate technical and organizational measures

  • Transparent data privacy policy

6. Physical and environmental security and technical access control

Access to premises and production environment is monitored through access controls and video surveillance in the production environment, so that only authorized personnel has access to equipment and information. Asset movement controls are in place for the Sevenum location and the Sevenum location is engineered for seismic, flood and other similar risks. In order to ensure data availability and integrity, cloud services are used for hosting data. All applications and infrastructure used in production are continuously monitored.

Access to all systems is password protected and granted only to authorized personnel. Password complexity as well as enforced password change are implemented to prevent unauthorized and inappropriate access. Two factor authentication and time-out of system access for remote access is in place.

Redcare Pharmacy uses encryption for data in transit and at rest. Access of system administrators and operators are audited and critical security updates released are installed. Detection and prevention systems are in place to protect network security.

7. Cyber security measures and audits

Redcare Pharmacy has taken many steps to protect itself from cyberattacks and strengthen its own cybersecurity. These include, but are certainly not limited to our long-standing participation in the ethical hacking and bug bounty platform Intigriti, through which we proactively and continuously have our IT systems checked for vulnerabilities by external experts.

In order to meet the requirements of the Payment Card Industry Data Security Standard (PCI-DSS), a vulnerability scan is performed every three months by an external testing agency to check our externally accessible infrastructure.

In addition, we have an all-encompassing penetration test performed at least annually by an external partner company.

Should vulnerabilities be identified, whether via Intigriti, during the three-monthly vulnerability scans or during the annual penetration test, these are addressed and remediated immediately.

8. Data protection and security

To be able to adequately be responsive to all issues arising around the topic of data protection, Redcare Pharmacy has an internal data protection coordinator who, in this position, is responsible for all issues around data security and data privacy. Next to that, an external data protection officer is in place who in close consultation holds an advisory and supervisory function. On the executive level, the Chief Information Officer and a lead pharmacist are responsible for data privacy and security issues.

We neither collect, nor process, nor transfer any personal data, (including both essential and non-essential personal data), without fulfilling our information obligations or, where needed, obtaining the customers' consent. The essential principles of legality, fairness and transparency, as well as the principles of data minimization, data economy and purpose limitation, among others, form the basis for the design of the related corporate processes, which means, among other things, that only data that is absolutely necessary for the operation of the company is collected and processed, like stated in our privacy policy.

9. Handling of data protection and privacy breaches

If a data protection breach occurs, it is reported internally and documented. In the first instance, the data privacy coordinator makes an initial assessment of the breach within 36 hours. The assessment of how to proceed with the breach is based on internally defined and prescribed criteria. If the initial assessment shows that the breach must be followed up, the breach is discussed in a second instance by the

Steering Committee (consisting of Executive Management member, Data Privacy Coordinator and Legal Counsel). A decision will be made whether to report the breach to the Dutch authority and what further actions need to be taken. If a decision is made to report the breach, the report is made within 72 hours of the breach.

In order to prevent future errors and to identify and eliminate possible sources of errors, all data protection errors that have occurred during a month are discussed in a monthly meeting attended by the data protection coordinator, the responsible department and the quality department.

10. Customer data and consumer rights

Redcare Pharmacy is fully compliant with the European General Data Protection Regulation (GDPR) and respects all consumer and customer rights as provided herein. These rights are the following.

10.1. The right to be informed

All customers have the right to know what data is being collected, how it is being used, how long it will be kept and whether it will be shared with any third parties.

All this information is stated in plain language in our privacy policy as published on our website.

10.2. The right to access

All customers can submit subject access requests, which oblige us to provide a copy of any personal data concerning the requester. We will provide this, as required, within one month. Usually, the provision happens within a few days.

10.3. The right to rectification

If customers discover that the information we hold on them is inaccurate or incomplete, they can request that it be updated. As with the right to access, we will fulfill the request within one month.

10.4. The right to erasure (also known as 'the right to be

forgotten')

All customers can request that we erase their data in certain circumstances, such as when the data is no longer necessary, the data was unlawfully processed or the data no longer meets the lawful ground for which it was collected. This includes instances where the customer withdraws consent.

10.5. The right to restrict processing

All customers can request that we limit the way we use their personal data.

That can be requested when the customer contests the accuracy of their personal data or when the customer no longer needs the information but we as Redcare Pharmacy require the data to establish, exercise or defend a legal claim.

10.6. The right to data portability

All customers are permitted to obtain and reuse their personal data for their own purposes across different services or request transfer to another service provider. This right only applies to personal data that a customer has provided us as data controller by way of a contract or consent.

10.7. The right to object

All customers can object to the processing of their personal data that is collected on the grounds of legitimate interests or the performance of a task in the interest/exercise of official authority.

10.8. Rights related to automated decision-making including

profiling

The GDPR includes provisions for decisions made with no human involvement, such as profiling, which uses personal data to make calculated assumptions about customers or individuals in general.

There are strict rules about this kind of processing, which we are fully compliant with, and all customers are permitted to challenge and request a review of the processing if they believe the rules are not being followed.

11. Human resources security and trainings

11.1. Confidentiality

All Redcare Pharmacy employees are bound to confidentiality and receive all necessary information about the confidential handling of data. The confidentiality is anchored in writing in the employment contract. In addition, a signed letter of commitment is obtained.

11.2. Data protection and cybersecurity training

Each employee receives training on data protection and security, privacy and information- and cybersecurity multiple times a year. The training courses on data protection cover all common and relevant topics of the GDPR and general data protection. In the cybersecurity training courses, all employees are made aware of how to deal with phishing and spam, among other things. Regular phishing tests are carried out, which should reveal whether special training is required for employees. In addition, management and special groups of people with access to sensitive data, such as employees in the HR department, have to undergo explicit training.

We have partnered with leading LMS and training provider knowbe4 to provide our employees with the best possible training and coaching on data protection and security, privacy and information security. Participation rates are carefully being monitored.

11.3. Onboarding trainings

Upon hiring, new employees are assigned to onboarding training, which includes basic training on information security, IT security and data protection. New employees must complete this training within three months, which is carefully

monitored. If deficits are identified, the employees are trained individually in the relevant topics. In addition, each new employee is sensitized by our information security officer in a mandatory session.

11.4. Termination of Employment

Upon termination of employment, all access to our IT systems and environments is removed and the company's assets, such as IT hardware, are retrieved.

12. Sub-contractors

Redcare Pharmacy has concluded data protection agreements/addendums with its service providers in order to ensure that at least the same level of confidentiality and data security is implemented by its sub-contractors.

Redcare Pharmacy has the right to perform audits in order to monitor the compliance of its subcontractors with the agreed technical and organizational measures regarding data confidentiality and security.

A service provider management system has been implemented.

Talk to a Data Expert

Have a question? We'll get back to you promptly.