Information Security Policy
It is our objective to operate under a documented and regularly verified Management System, aligned with the standards set by UNE-EN-ISO 27001, as a way to ensure that all applicable requirements within the company are met.
Commitments
We are committed to complying with the requirements of our clients and stakeholders, as well as with legal, regulatory, and any other requirements the organization subscribes to.
We are committed to maintaining a risk-based approach and to continuously improving the effectiveness of the Information Security Management System.
We are committed to the ongoing improvement of the Information Security Management System’s effectiveness, aiming to efficiently achieve the company’s objectives and meet client expectations.
We are committed to delivering the highest quality of our services in a standardized way, with a focus on total customer satisfaction, as a guarantee of continuity, growth, and development.
We will provide the material and human resources necessary to achieve our objectives, with the firm belief that the associated cost is the most profitable investment this company can make.
Strategies
To use Information Security Management as a tool to avoid customer dissatisfaction and prevent any loss of competitiveness for our company.
To leverage Information Security Management as a tool for optimizing our internal operations, with the goal of meeting the needs and expectations of our clients and stakeholders.
To promote a culture of information security among all personnel, raising awareness of the importance of their role in contributing to the image we aim to project to our clients and stakeholders.
To make INFORMATION SECURITY a defining concept that sets our company apart from the competition.
To drive innovation in the sector through investment in technology.
We consider it an inexcusable duty to ensure the security of information, both internal and that of our clients, safeguarding the three fundamental pillars: integrity, availability, and confidentiality of all entrusted data.
This policy will be communicated, implemented, and continuously maintained within our organization, and will be made available to all our stakeholders.