Skip to content

Security Policy for Suppliers and Other Stakeholders of SIA

1. General Commitment

SIA INTERACTIVE is committed to conducting its activities with integrity and transparency, prioritizing the protection of the information it manages, in accordance with its Information Security Policy, as well as compliance with applicable laws and ethical business practices.

2. Scope and Compliance Obligation

Suppliers, representatives, contractors, and other stakeholders are required to comply with this Supplier Security Policy, as well as all applicable regulations in the locations where they operate. They must also ensure that their own personnel and partners comply with these obligations.



3. Confidentiality and Data Protection Obligations

  • Maintain confidentiality of all information accessed in the course of providing services, even after the contractual relationship has ended.
  • Not disclose any information and ensure proper protection of all data handled.
  • Comply with the requirements of Law 25,326 regarding personal data protection.
  • Provide training to personnel on personal data privacy and protection.
  • Comply with all applicable data protection regulations in the jurisdictions where services are provided.


4. Information Security

  • Appoint a security officer who will act as the main point of contact and ensure compliance with agreed security controls.
  • Ensure that access rights are revoked for terminated personnel, both for systems and physical facilities.
  • Properly manage SIA assets, preventing damage, loss, or unauthorized access.
  • Establish guidelines for data connection, transmission, and return of devices upon completion of activities.
  • Ensure proper management of user identities, access credentials, and passwords.
  • Follow emergency and incident response plans related to information security.
  • Maintain a high level of physical security at their facilities.


5. Audits and Control

  • Allow security audits by SIA INTERACTIVE, its clients, or authorized third parties.
  • Provide access for verification of implemented security procedures and controls.


6. Risk and Process Management

Suppliers must implement appropriate controls to minimize risks, including:

  • Secure hiring and onboarding processes.
  • Procedures for returning or destroying information after service completion.
  • Information security training programs.
  • Incident and non-conformity management processes.
  • Emergency and disaster recovery plans.


7. Breaches and Measures

In the event of a breach of this Policy, SIA INTERACTIVE may take appropriate actions, including sanctions, suspension, or termination of the contractual relationship.



8. Whistleblowing Channel

If you have any concerns or wish to report a violation of this Policy, you may do so anonymously through the contact channels available on the website www.siainteractive.com.



9. Update

Document last updated on January 20, 2025.