Information Security Policy

TO PROVIDE CONTINUOUS DEVELOPMENT OF OUR INFORMATION SECURITY MANAGEMENT SYSTEM THAT IS FOUNDED IN OUR ORGANIZATION:

IDENTIFICATION OF INFORMATION ASSETS OF THESE ASSETS,

BUSINESS IMPACT: by addressing issues such as the cost of replacing the asset, the confidentiality of information, its impact on image, and the damage it will cause in terms of legal and legal obligations,

THREAT POSSIBILITY: by addressing the number of weaknesses and how much existing controls can overcome these weaknesses, aggressive motivation, appeal of information to competitors, vulnerabilities in access controls, and integrity of information,

INFORMATION PRIVACY, FOR THE INTEGRITY AND ACCESS TO RISK DETERMINING, ASSESSMENT, ACCEPTABLE LOCATED ON THE LEVEL NECESSARY CHECKS FOR ALL OTHER APPLICATIONS, PERFORMANCE MEASUREMENT of INFORMATION SECURITY PROCESS TARGETS GENERATING THESE DATA, VULNERABILITY our AND THREATS OF INFRASTRUCTURE, ENVIRONMENT, EQUIPMENT, with SOFTWARE AND EDUCATION INVESTMENT COMMITMENT TO THE MINIMUM DOWNLOAD, TO OBTAIN THE SAFETY REQUIREMENTS REQUIRED BY OUR BUSINESS, CUSTOMERS AND LEGAL CONDITIONS, COMPLIANCE WITH THE INFORMATION SAFETY BASIS AND INSTRUCTIONS OF ISO 27001.