{"id":27697,"date":"2022-04-11T10:13:06","date_gmt":"2022-04-11T08:13:06","guid":{"rendered":"https:\/\/decidesoluciones.es\/?page_id=27697"},"modified":"2023-11-08T13:02:36","modified_gmt":"2023-11-08T12:02:36","slug":"security-policy-2","status":"publish","type":"page","link":"https:\/\/decidesoluciones.es\/en\/security-policy-2\/","title":{"rendered":"Security Policy"},"content":{"rendered":"\n<p>DECIDE&#8217;s Security Policy reflects the principles and objectives of information security, the results of which enable our company to achieve its goal of improving how information is used both internally and externally.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>By drawing up, communicating, and maintaining this policy, DECIDE&#8217;s management shows its commitment to protecting the <strong>confidentiality<\/strong> of the information with which it operates in the provision of its services, ensuring its <strong>integrity<\/strong> in all processing processes carried out, as well as the <strong>availability<\/strong> of the information systems involved in these treatments.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To this end, the Management has defined and implemented an Information Security Management System that allows the company to guarantee that the information systems and the information itself that is created, collected, stored and processed complies with:<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security in Human Resource Management, before, during and upon the termination of employment.<\/li>\n\n\n\n<li>Proper asset management involving the classification of information and the handling of media. As well as, and the establishment of robust logical access control to its systems and applications, managing user permissions and privileges.<\/li>\n\n\n\n<li>Protect facilities and the physical environment, by designing secure work areas and securing equipment.<\/li>\n\n\n\n<li>Ensure safe operations by protecting against malware, backing up, logging, monitoring, and controlling software in operation.<\/li>\n\n\n\n<li>Management of technical vulnerabilities and the choice of appropriate techniques for auditing systems.<\/li>\n\n\n\n<li>Communications security, protecting networks and information exchange.<\/li>\n\n\n\n<li>Ensuring security in the acquisition and maintenance of information systems, limiting and managing change.<\/li>\n\n\n\n<li>The conduct of secure software development, separating the development and production environments, and performing appropriate functional acceptance testing.<\/li>\n\n\n\n<li>Controlling relationships with suppliers, contractually requiring compliance with relevant security measures and acceptable service levels.<\/li>\n\n\n\n<li>Effectiveness in the management of security incidents, establishing appropriate channels for reporting, response and time learning.<\/li>\n\n\n\n<li>The realisation of a business continuity plan that protects the availability of services during a crisis or disaster.<\/li>\n\n\n\n<li>Identifying and complying with applicable regulations with a special focus on intellectual<\/li>\n\n\n\n<li>The periodic review and continual improvement of our information security management system to ensure compliance with and effectiveness of these legal and regulatory requirements.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>All the organisation\u2019s personnel must comply with this policy, for which the management has the necessary means and sufficient resources for its fulfilment, and assumes the responsibility of communicating it and keeping it accessible to all interested parties.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Updated as of 08\/11\/2023<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DECIDE&#8217;s Security Policy reflects the principles and objectives of information security, the results of which enable our company to achieve its goal of improving how information is used both internally and externally. By drawing up, communicating, and maintaining this policy, DECIDE&#8217;s management shows its commitment to protecting the confidentiality of the information with which it&hellip;<\/p>\n","protected":false},"author":30,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27697","page","type-page","status-publish","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Policy - Decide<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Policy - Decide\" \/>\n<meta property=\"og:description\" content=\"DECIDE&#8217;s Security Policy reflects the principles and objectives of information security, the results of which enable our company to achieve its goal of improving how information is used both internally and externally. By drawing up, communicating, and maintaining this policy, DECIDE&#8217;s management shows its commitment to protecting the confidentiality of the information with which it&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/decidesoluciones.es\/en\/security-policy-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Decide\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-08T12:02:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@canaldecide\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/security-policy-2\\\/\",\"url\":\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/security-policy-2\\\/\",\"name\":\"Security Policy - Decide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/#website\"},\"datePublished\":\"2022-04-11T08:13:06+00:00\",\"dateModified\":\"2023-11-08T12:02:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/security-policy-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/security-policy-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/security-policy-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/decide-2\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/\",\"name\":\"Decide\",\"description\":\"Advanced Analytics. Smart Decisions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/decidesoluciones.es\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Policy - Decide","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Security Policy - Decide","og_description":"DECIDE&#8217;s Security Policy reflects the principles and objectives of information security, the results of which enable our company to achieve its goal of improving how information is used both internally and externally. By drawing up, communicating, and maintaining this policy, DECIDE&#8217;s management shows its commitment to protecting the confidentiality of the information with which it&hellip;","og_url":"https:\/\/decidesoluciones.es\/en\/security-policy-2\/","og_site_name":"Decide","article_modified_time":"2023-11-08T12:02:36+00:00","twitter_card":"summary_large_image","twitter_site":"@canaldecide","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/decidesoluciones.es\/en\/security-policy-2\/","url":"https:\/\/decidesoluciones.es\/en\/security-policy-2\/","name":"Security Policy - Decide","isPartOf":{"@id":"https:\/\/decidesoluciones.es\/en\/#website"},"datePublished":"2022-04-11T08:13:06+00:00","dateModified":"2023-11-08T12:02:36+00:00","breadcrumb":{"@id":"https:\/\/decidesoluciones.es\/en\/security-policy-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/decidesoluciones.es\/en\/security-policy-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/decidesoluciones.es\/en\/security-policy-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/decidesoluciones.es\/en\/decide-2\/"},{"@type":"ListItem","position":2,"name":"Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/decidesoluciones.es\/en\/#website","url":"https:\/\/decidesoluciones.es\/en\/","name":"Decide","description":"Advanced Analytics. Smart Decisions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/decidesoluciones.es\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/decidesoluciones.es\/en\/wp-json\/wp\/v2\/pages\/27697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/decidesoluciones.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/decidesoluciones.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/decidesoluciones.es\/en\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/decidesoluciones.es\/en\/wp-json\/wp\/v2\/comments?post=27697"}],"version-history":[{"count":4,"href":"https:\/\/decidesoluciones.es\/en\/wp-json\/wp\/v2\/pages\/27697\/revisions"}],"predecessor-version":[{"id":29918,"href":"https:\/\/decidesoluciones.es\/en\/wp-json\/wp\/v2\/pages\/27697\/revisions\/29918"}],"wp:attachment":[{"href":"https:\/\/decidesoluciones.es\/en\/wp-json\/wp\/v2\/media?parent=27697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}