The Information Security Policy establishes the guidelines and principles established by IZO CORPORATE, S.L.U. to ensure the protection of information, as well as compliance with defined security objectives, thus ensuring the confidentiality, integrity and availability of information systems and compliance with associated legal requirements.
Así mismo, somos conscientes de la importancia del cumplimiento de la reglamentación vigente en materia de protección de datos personales y las implicaciones para la empresa y sus partes interesadas.We are also aware of the importance of complying with current regulations on the protection of personal data and the implications for the company and its stakeholders.
The Management of IZO CORPORATE assumes and provides for the following commitments with respect to the Information Security Management System (ISMS):
- Ensure the confidentiality, integrity and availability of information.
- Comply with all applicable legal requirements.
- Ensure business continuity by developing continuity plans in accordance with recognized methodologies.
- Provide the organization with all the necessary resources for proper management of the Information Security System.
- Train and make all employees aware of information security.
- Meeting the security expectations and needs of all our stakeholders
- Provide resources to prevent information security incidents and to properly manage incidents that have occurred, as well as to take all necessary measures to prevent their repetition.
- Inform all employees of their security functions and obligations and the obligation to comply.
- Continuously improve the ISMS and with it the organization's information security.
- Perform and periodically review a risk analysis based on recognized methods that allow us to establish the level of information security and personal data protection and minimize risks by developing specific policies, technical solutions and contractual agreements with specialized organizations.
- Asegurar la seguridad desde el diseño de todos los sistemas y aplicaciones que desarrolle o mantenga IZO CORPORATE, mediante la integración de controles de seguridad en todas las fases del Ciclo de Vida del Desarrollo de Software. Esto incluye la definición de requisitos de seguridad, la realización de pruebas de seguridad estáticas y dinámicas, la gestión rigurosa de los cambios y la segregación adecuada de los entornos de desarrollo, pruebas y producción para proteger la integridad del código y los datos.