{"id":16916,"date":"2020-01-08T20:07:59","date_gmt":"2020-01-08T20:07:59","guid":{"rendered":"https:\/\/businessadapter.es\/information-security-policy\/"},"modified":"2025-01-02T16:40:13","modified_gmt":"2025-01-02T16:40:13","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/businessadapter.es\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\"><strong>Business Adapter<\/strong>, a company that offers consulting services and data protection audit RGPD, LOPD-GDD and web regulations LSSICE, Data Protection Officer services, DPO\/DPD, training services, backup and confidential destruction of information. Our main objective is the <strong>satisfaction of our clients<\/strong>, based on the values of efficiency, seriousness, professionalism and the execution of quality work with security guarantees, both of the information and documentation with which we work, as well as the data. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">This means that both <strong>Business Adapter<\/strong> &#8216;s Management and its personnel must apply the established security measures and establish control and follow-up mechanisms. For this purpose, a set of measures, controls, procedures and actions have been implemented to protect all assets, including information and the processes that support it, as well as systems and networks. It is important that the principles of the Security Policy are part of the organizational culture. To this end, a clear commitment of those responsible for each area must be ensured for the dissemination, consolidation and compliance with this Policy. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">In order to guarantee information security, the Management has developed and implemented an information security management system, the main pillars and objectives of which are as follows:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">To know our customers&#8217; needs and satisfy them.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Comply with all legal provisions in force and applicable regulations, applying legal compliance to the activities that the company develops and the requirements required by our customers, even beyond the legal minimums that are economically and technologically feasible.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Establish a system of continuous improvement to optimize and increase the quality of our service.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">The Information Security Management System is not a matter of one person, but is the result of the joint work of all the members of the company, who are provided with constant and adequate training.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">To protect the Company&#8217;s information resources and the technology used to process them against internal or external, deliberate or accidental threats.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Establish methods of notification, management and registration of incidents related to the Information Security Management Systems (ISMS), and carry out a continuous review of these controls to ensure compliance with security requirements, and thus contribute to continuous improvement.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Define a strict policy for copying and storing information relevant to the company.<\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Ensure proper management of access to our systems through the implementation of an identification and authentication system. This not only restricts access to third parties but also facilitates the work of our employees in a completely secure environment. <\/span><\/li>\n<li><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Define performance standards that ensure an adequate balance between the needs of users, safety requirements and respect for the laws in force.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">All <strong>Business Adapter<\/strong> personnel shall comply with the guidelines, rules and procedures, and as a consequence shall assume the duty to cooperate with this organization in the interest of ensuring that there are no alterations or violations of<\/span><br \/>\n<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">these rules.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">All persons who provide their services in <strong>Business Adapter<\/strong> must know and assume the obligations regarding the correct use of computer resources. Failure to comply with these obligations by personnel may give rise to disciplinary liability, and the exercise of legal procedures by the company for its enforcement. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Consequently, the Management extends this commitment to all employees, as well as to those who act on behalf of <strong>Business Adapter<\/strong> to comply with the guidelines of this policy, which will be periodically reviewed to ensure that they are always appropriate to the activities of the organization.<\/span><br \/>\n<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">ensure that they are always appropriate to the organization&#8217;s activities.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">Management extends this commitment to all interested parties to comply with the guidelines of this policy, which will be reviewed periodically to ensure that they are always appropriate to the activities of the organization.<\/span><\/p>\n<p style=\"text-align: right;\"><span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">The Address,<\/span><br \/>\n<span style=\"font-family: tahoma,arial,helvetica,sans-serif; font-size: 12pt;\">December 5, 2019<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Business Adapter, a company that offers consulting services and data protection audit RGPD, LOPD-GDD and web regulations LSSICE, Data Protection [&hellip;]<\/p>\n","protected":false},"author":1373,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-16916","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/pages\/16916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/comments?post=16916"}],"version-history":[{"count":1,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/pages\/16916\/revisions"}],"predecessor-version":[{"id":17013,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/pages\/16916\/revisions\/17013"}],"wp:attachment":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/media?parent=16916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}