{"id":31545,"date":"2024-10-29T17:45:43","date_gmt":"2024-10-29T17:45:43","guid":{"rendered":"http:\/\/itbid.com\/?page_id=31545"},"modified":"2024-11-10T18:16:47","modified_gmt":"2024-11-10T18:16:47","slug":"information-security-and-business-continuity-policy","status":"publish","type":"page","link":"https:\/\/staging.itbid.com\/en\/information-security-and-business-continuity-policy\/","title":{"rendered":"Information Security and Business Continuity Policy"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Itbid is aware that the security of information related to our customers is a critical resource, and has established an Information Security Management System in accordance with the requirements of the ISO\/IEC 27001:2022 standard to ensure the continuity of information systems, minimize the risk of damage, and ensure the fulfillment of the set objectives.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The objective of the Security Policy is to establish the necessary framework to protect information resources from internal or external, deliberate or accidental threats, in order to ensure the confidentiality, integrity, and availability of information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The effectiveness and implementation of the Information Security Management System is the direct responsibility of the Information Security Committee, which is responsible for the approval, dissemination, and compliance with this Security Policy. A Responsible Person for the Information Security Management System has been appointed in its name and representation, who has sufficient authority to play an active role in the Information Security Management System, overseeing its implementation, development, and maintenance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Information Security Committee will proceed to develop and approve the risk analysis methodology used in the Information Security Management System.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Any person whose activities may, directly or indirectly, be affected by the requirements of the Information Security Management System is obligated to strictly comply with the Security Policy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At Itbid, all necessary measures will be implemented to comply with applicable regulations on security in general and IT security, related to IT policies, building and facility security, and the behavior of employees and third parties associated with Itbid in the use of IT systems. The necessary measures to ensure information security through the application of standards, procedures, and controls should ensure the confidentiality, integrity, and availability of information, essential for:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Comply with current legislation on information systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure the confidentiality of data managed by Itbid.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure the availability of information systems, both in services offered to customers and in internal management.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure the ability to respond to emergency situations, restoring critical services in the shortest possible time.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prevent undue alterations to information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Promote awareness and training in information security.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Establish objectives and goals focused on the evaluation of performance in information security, as well as continuous improvement in our activities, regulated in the Management System that develops this policy.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">BUSINESS CONTINUITY POLICY<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">ITBID TECHNOLOGIES 2002, SL has as a policy to maintain a Business Continuity Management System (hereinafter BCM) that:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identifies potential threats to ITBID TECHNOLOGIES 2002, SL, as well as the impact on business operations, in case they materialize, that they could cause.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provides a framework to increase the resilience capacity of ITBID TECHNOLOGIES 2002, SL to respond effectively.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensures the rapid and efficient recovery of essential operations against any physical or logical disaster that may occur or any other incident that threatens the continuity of the services provided to customers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Preserves the interests of its main stakeholders (customers, employees, and suppliers), reputation, brand, and value creation activities.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To ensure that the BCM aligns with the changing needs of ITBID TECHNOLOGIES 2002, SL, continuity plans will be regularly tested, continuously reviewed, and regularly audited.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A risk analysis has been conducted, evaluating the impacts and business objectives for prevention and defining the recovery levels, prioritizing Business Continuity in critical activities:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Information Security Systems supporting the development and commercialization of modules for managing purchases in cloud technology and based on the SaaS model&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The BCM has been developed following the instructions and under the supervision of the Management of ITBID TECHNOLOGIES 2002, SL. It is designed to ensure the services provided to customers and to facilitate a return to normal operations in the shortest time possible with minimal disruption. Management fully supports the BCM and expects all personnel to be familiar with its contents and that the plans are ready to be activated at any time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Barcelona, January 9, 2023<\/span><span style=\"font-weight: 400;\"> <\/span><span style=\"font-weight: 400;\">Signed: Josep Puig (Management ITBID Technologies 2002, SL)<\/span><br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Itbid is aware that the security of information related to [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-31545","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/staging.itbid.com\/en\/wp-json\/wp\/v2\/pages\/31545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.itbid.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.itbid.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.itbid.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.itbid.com\/en\/wp-json\/wp\/v2\/comments?post=31545"}],"version-history":[{"count":1,"href":"https:\/\/staging.itbid.com\/en\/wp-json\/wp\/v2\/pages\/31545\/revisions"}],"predecessor-version":[{"id":31546,"href":"https:\/\/staging.itbid.com\/en\/wp-json\/wp\/v2\/pages\/31545\/revisions\/31546"}],"wp:attachment":[{"href":"https:\/\/staging.itbid.com\/en\/wp-json\/wp\/v2\/media?parent=31545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}