Information Security Policy
Aquí tiene la traducción al inglés del texto proporcionado:
Information Security Policy
SERQUO SOFTWARE S.A., a software and technology company specializing in web development, financial device connectivity, and payment methods, has decided to implement an Information Security Management System based on the ISO 27001 standard. The objective is to preserve the confidentiality, integrity, and availability of information and data protection, to protect it from a wide range of threats, and to ensure the continuity of business lines, minimize damage, maximize the return on investments and business opportunities, and promote continuous improvement.
The Management of SERQUO SOFTWARE S.A. is aware that information is an asset with high value for the Organization and therefore requires adequate protection.
The Management of SERQUO SOFTWARE S.A. establishes the following as base objectives, starting points, and support for the objectives and principles of information security:
- Protection of personal data and people’s privacy.
- Safeguarding the organization’s records.
- Protection of intellectual property rights.
- Documentation of the information security policy.
- Assignment of security responsibilities.
- Training and qualification for information security.
- Recording of security incidents.
- Business continuity management.
- Management of any changes that may occur within the company related to security.
The Management of SERQUO SOFTWARE S.A., through the development and implementation of this Information Security Management System, commits to the following:
- Develop products and services in compliance with legislative requirements, identifying the applicable legislation for the business lines developed by the organization and included in the scope of the Information Security Management System.
- Establishment and compliance with contractual requirements with interested parties.
- Define security training requirements and provide the necessary training on this matter to interested parties, through the establishment of training plans.
- Prevention and detection of viruses and other malicious software, through the development of specific policies and the establishment of contractual agreements with specialized organizations.
- Business continuity management, developing continuity plans in compliance with internationally recognized methodologies.
- Establishment of the consequences for security policy violations, which will be reflected in the contracts signed with interested parties, suppliers, and subcontractors.
- Act at all times within the strictest professional ethics.
This Policy provides the framework for the continuous improvement of the Information Security Management System as well as for establishing and reviewing the objectives of the Information Security Management System. It is communicated to the entire Organization through the document manager installed in the organization and its publication on information panels, being reviewed annually for suitability and extraordinarily when special situations and/or substantial changes in the Information Security Management System occur, and is available to the general public.
Management of information associated with application development, financial device connectivity (ATM), and payment methods, as well as software and digital product development, and training and audit services according to the current Statement of Applicability.
Management
Madrid, May 24, 2022