{"id":392,"date":"2024-09-04T11:04:06","date_gmt":"2024-09-04T11:04:06","guid":{"rendered":"https:\/\/bdrcyber.com\/?page_id=392"},"modified":"2024-09-04T11:04:06","modified_gmt":"2024-09-04T11:04:06","slug":"security-policy-2","status":"publish","type":"page","link":"https:\/\/bdrcyber.com\/?page_id=392","title":{"rendered":"Security Policy"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bbRGBA(255,255,255,0)\u00bb background_image=\u00bbhttps:\/\/bdrcyber.com\/wp-content\/uploads\/2024\/08\/financial-technology-31c-300&#215;135-1-e1724656231504.jpg\u00bb custom_padding=\u00bb26px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb22px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb custom_padding=\u00bb||0px|||\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h1><span style=\"color: #ffffff;\"><span class=\"text-600\">Information Security Policy<\/span><\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p><span style=\"color: #ffffff;\">The information security policy of BDR Inform\u00e0tica i Comunicacions SL is based on the following principles, commitments and objectives: \u00a0<\/span><\/p>\n<ul>\n<li><span style=\"color: #ffffff;\">Confidentiality: guarantee that only authorized persons access the information or serve it. \u00a0<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Integrity: guarantee that the information or service is presented correctly. \u00a0<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Availability: Meet service requirements. \u00a0<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Compliance with information security measures, whether documented or not.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Compliance with customer, legal and regulatory requirements regarding information security<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Continuous improvement.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Leadership. That the people responsible for people and processes are role models.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Participation of people. All people have the autonomy and opportunity to participate in the functioning of the Organization.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Mutually beneficial relationships with customers and suppliers that provide long-term relationships based on trust.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Based approach:<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #ffffff;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 &#8211;\u00a0In processes. Customer orientation, improvement of internal communication and teamwork.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 &#8211;\u00a0System for management. Interrelation between processes.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 &#8211;\u00a0In facts for decision making. We measure, analyze and make decisions to try to improve.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">This policy adapts to the strategy of the company BDR Inform\u00e1tica y Comunicaciones SL<\/span><\/p>\n<p><span style=\"color: #ffffff;\">All own and subcontracted persons are responsible for compliance with this policy.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">In the event of non-compliance with this policy, sanctioning and disciplinary processes may be triggered, in addition to the resulting civil or criminal liability.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">This policy is developed through information security regulations.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security PolicyThe information security policy of BDR Inform\u00e0tica i Comunicacions SL is based on the following principles, commitments and objectives: \u00a0 Confidentiality: guarantee that only authorized persons access the information or serve it. \u00a0 Integrity: guarantee that the information or service is presented correctly. \u00a0 Availability: Meet service requirements. \u00a0 Compliance with information security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"footnotes":""},"class_list":["post-392","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/bdrcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bdrcyber.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bdrcyber.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bdrcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bdrcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=392"}],"version-history":[{"count":1,"href":"https:\/\/bdrcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/392\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/bdrcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/392\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/bdrcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}