{"id":25658,"date":"2024-02-07T14:28:43","date_gmt":"2024-02-07T13:28:43","guid":{"rendered":"http:\/\/13.39.235.70\/?page_id=25658"},"modified":"2024-06-05T15:52:55","modified_gmt":"2024-06-05T14:52:55","slug":"information-securitypolicy","status":"publish","type":"page","link":"https:\/\/profile.es\/en\/information-securitypolicy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"25658\" class=\"elementor elementor-25658\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2dbc3321 hero e-flex e-con-boxed e-con e-parent\" data-id=\"2dbc3321\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4d942cac e-flex e-con-boxed e-con e-child\" data-id=\"4d942cac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68b5a235 elementor-widget elementor-widget-heading\" data-id=\"68b5a235\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"title-yellow\"> INFORMATION SECURITY<\/span> POLICY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17e7ebc8 e-flex e-con-boxed e-con e-parent\" data-id=\"17e7ebc8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72ed999d elementor-widget elementor-widget-heading\" data-id=\"72ed999d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Purpose of the processing of your personal data<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dd2d47a elementor-widget elementor-widget-text-editor\" data-id=\"6dd2d47a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<table><thead><tr><th>Date<\/th><th>Version<\/th><th>Created by<\/th><th>Description of change<\/th><\/tr><\/thead><tbody><tr><td data-label=\"Fecha:\">2019-01-16<\/td><td data-label=\"Versi\u00f3n:\">1.0<\/td><td data-label=\"Creado por:\">Responsible for the ISMS<\/td><td data-label=\"Descripci\u00f3n del cambio:\">Initial version<\/td><\/tr><tr><td data-label=\"Fecha:\">2021-09-16<\/td><td data-label=\"Versi\u00f3n:\">2.0<\/td><td data-label=\"Creado por:\">Responsible for the SGSI<\/td><td data-label=\"Descripci\u00f3n del cambio:\">Periodic review<\/td><\/tr><tr><td data-label=\"Fecha:\">2023-12-13<\/td><td data-label=\"Versi\u00f3n:\">3.0<\/td><td data-label=\"Creado por:\">\u00a0Responsible for the SGSI<\/td><td data-label=\"Descripci\u00f3n del cambio:\">Revision and updating of the document<\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d74826f elementor-widget elementor-widget-table-of-contents\" data-id=\"6d74826f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h3&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;marker_view&quot;:&quot;numbers&quot;,&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h3 class=\"elementor-toc__header-title\">\n\t\t\t\tContent\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__6d74826f\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fba60cc elementor-widget elementor-widget-heading\" data-id=\"1fba60cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65de3e86 elementor-widget elementor-widget-text-editor\" data-id=\"65de3e86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The purpose of this document is to establish the necessary guidelines to ensure the information systems necessary for the provision of services through compliance with all applicable legal obligations within the<strong> Information Security Management System (ISMS) of PROFILE SOFTWARE SERVICES, S.L.<\/strong>, hereinafter <strong>PROFILE<\/strong>, determining whether the system complies with the provisions planned for the management of information security based on the international standard <strong>ISO\/IEC 27001 &#8220;Information Security Management Systems&#8221; (ISMS)<\/strong>. Likewise, it will ensure that all service components are under control, in order to continue providing services with the quality expected by customers, avoiding problems that may affect the security of systems and services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa34543 elementor-widget elementor-widget-heading\" data-id=\"fa34543\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Responsibilities<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37cfb649 elementor-widget elementor-widget-text-editor\" data-id=\"37cfb649\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It shall be the responsibility of the Security Committee, the person responsible for the ISMS, the internal auditor, if any, and the management of the organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3978897b elementor-widget elementor-widget-heading\" data-id=\"3978897b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Objectives of the management system<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50b2c651 elementor-widget elementor-widget-text-editor\" data-id=\"50b2c651\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Ensure confidentiality, integrity and availability of information.<\/li><li>Comply with all legal requirements applicable to the organization.<\/li><li>Manage Information Security Risks.<\/li><li>Periodically establish improvement objectives aligned with this policy.<\/li><li>Meet the expectations and requirements of interested parties.<\/li><li>Develop a continuity plan to recover from a disaster in the shortest possible time.<\/li><li>Train and raise awareness of information security among all employees.<br \/>Properly record and manage all security incidents that occur.<\/li><li>Inform all employees of their security roles and obligations and their responsibility to comply with them.<\/li><li>Conduct periodic reviews with the objective of continuously improving the organization&#8217;s information security.<\/li><li>Continuously improve the ISMS and, therefore, the organization&#8217;s information security.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3527ff9e elementor-widget elementor-widget-heading\" data-id=\"3527ff9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Planning<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31627bc7 elementor-widget elementor-widget-text-editor\" data-id=\"31627bc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The actions to be carried out by <strong>PROFILE<\/strong> to comply with the security objectives include the implementation, operation and maintenance of the information security management system, which is aligned with this policy at all times.<\/p><p>In order to ensure proper security management, <strong>PROFILE<\/strong> conducts a study of the organization&#8217;s security through a risk analysis and the establishment of a risk treatment plan for those risks not accepted by the organization&#8217;s Management Committee.<\/p><p>The procedure for carrying out the risk analysis is documented in<strong> ISMS Risk Analysis Methodology<\/strong>, where the requirements for evaluating the different threats to which they are exposed are established.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-564a31d3 elementor-widget elementor-widget-heading\" data-id=\"564a31d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Deployment<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20927842 elementor-widget elementor-widget-text-editor\" data-id=\"20927842\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Once the security risk assessment has been carried out and based on the results obtained in the planning phase, it is the task of the Security Manager with the support of the Committee, to implement certain security controls for those threats that have a level of risk not assumed by the organization, in addition to operating the procedures of the management system to comply with the requirements of the process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac90e26 elementor-widget elementor-widget-heading\" data-id=\"ac90e26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Review<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54290af4 elementor-widget elementor-widget-text-editor\" data-id=\"54290af4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The information security policy and risk assessment are reviewed regularly at planned intervals or if significant changes occur to ensure its continuing suitability, efficiency and effectiveness. Generally are reviewed annually by conducting an internal ISMS audit or management review of the system, which plays an important role in performing an in-depth analysis of the system and detecting possible improvements and deficiencies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75b80c77 elementor-widget elementor-widget-heading\" data-id=\"75b80c77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Improvement<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3241cffb elementor-widget elementor-widget-text-editor\" data-id=\"3241cffb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Improvements to the information security policy and the ISMS are established either during the review phases or on the basis of contributions considered interesting both from the organization&#8217;s personnel and from external personnel.<\/p><p>The results obtained from the internal audit are reviewed by the Security Manager and submitted to the ISMS Committee, where opportunities for improvement of the system are established.<\/p><p>The entire ISMS is framed within the Deming cycle (PDCA cycle), based on the planning of activities, their implementation and operation, their review and subsequent improvement. All this applied to information security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77a38391 elementor-widget elementor-widget-heading\" data-id=\"77a38391\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">User responsibilities<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51bd55ad elementor-widget elementor-widget-text-editor\" data-id=\"51bd55ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>The users of the information systems shall strive to promote their efficient use in order to avoid unnecessary network traffic.<\/li><li>The users themselves shall be responsible for the proper custody of the assets they have in their possession for the performance of their contractual duties.<\/li><li>Not to disclose or directly use the information to which they have access during their working relationship with PROFILE. All commitments must be maintained, even after termination of the employment relationship with the company.<\/li><li>Ensure that all employees and third parties understand their responsibilities and are suitable to carry out their duties to reduce the risk of theft, fraud or misuse of the resources made available to them.<\/li><li>Any unauthorized physical access will be prevented and security measures will be taken to avoid loss, damage, theft or circumstances that jeopardize the assets or that may cause the interruption of PROFILE&#8217;s activities.<\/li><li>Internet and e-mail users shall make efficient use of the networks, as well as preserve the confidentiality and integrity of information transmitted through these media.<\/li><li>Access to the organization&#8217;s information systems shall be controlled so that only authorized personnel and under the security conditions that the organization has decided to operate.<\/li><li>All security incidents shall be recorded.<\/li><li>Any breach of laws or legal, regulatory or contractual obligations and security requirements affecting PROFILE&#8217;s information systems shall be avoided.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>INFORMATION SECURITY POLICY Purpose of the processing of your personal data Date Version Created by Description of change 2019-01-16 1.0 Responsible for the ISMS Initial version 2021-09-16 2.0 Responsible for the SGSI Periodic review 2023-12-13 3.0 \u00a0Responsible for the SGSI Revision and updating of the document Content Target The purpose of this document is to &#8230; <a title=\"Information Security Policy\" class=\"read-more\" href=\"https:\/\/profile.es\/en\/information-securitypolicy\/\" aria-label=\"Read more about Information Security Policy\">Read more<\/a><\/p>\n","protected":false},"author":83,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-25658","page","type-page","status-publish"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Policy - Profile Software Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/profile.es\/politica-de-seguridad-de-informacion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy - Profile Software Services\" \/>\n<meta property=\"og:description\" content=\"INFORMATION SECURITY POLICY Purpose of the processing of your personal data Date Version Created by Description of change 2019-01-16 1.0 Responsible for the ISMS Initial version 2021-09-16 2.0 Responsible for the SGSI Periodic review 2023-12-13 3.0 \u00a0Responsible for the SGSI Revision and updating of the document Content Target The purpose of this document is to ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/profile.es\/politica-de-seguridad-de-informacion\/\" \/>\n<meta property=\"og:site_name\" content=\"Profile Software Services\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-05T14:52:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@EsProfile\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/profile.es\\\/politica-de-seguridad-de-informacion\\\/\",\"url\":\"https:\\\/\\\/profile.es\\\/politica-de-seguridad-de-informacion\\\/\",\"name\":\"Information Security Policy - Profile Software Services\",\"isPartOf\":{\"@id\":\"\\\/#website\"},\"datePublished\":\"2024-02-07T13:28:43+00:00\",\"dateModified\":\"2024-06-05T14:52:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/profile.es\\\/politica-de-seguridad-de-informacion\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/profile.es\\\/politica-de-seguridad-de-informacion\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/profile.es\\\/politica-de-seguridad-de-informacion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/profile.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"\\\/#website\",\"url\":\"\\\/\",\"name\":\"Profile Software Services\",\"description\":\"\",\"publisher\":{\"@id\":\"\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"\\\/#organization\",\"name\":\"Profile Software Services\",\"url\":\"\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/profile.es\\\/wp-content\\\/media\\\/logo-profile-1.png\",\"contentUrl\":\"https:\\\/\\\/profile.es\\\/wp-content\\\/media\\\/logo-profile-1.png\",\"width\":500,\"height\":500,\"caption\":\"Profile Software Services\"},\"image\":{\"@id\":\"\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/EsProfile\",\"https:\\\/\\\/www.instagram.com\\\/esprofile\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/profile-software-services\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCs1Uk7DFBPrijU0bZ83kwHA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy - Profile Software Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/profile.es\/politica-de-seguridad-de-informacion\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Policy - Profile Software Services","og_description":"INFORMATION SECURITY POLICY Purpose of the processing of your personal data Date Version Created by Description of change 2019-01-16 1.0 Responsible for the ISMS Initial version 2021-09-16 2.0 Responsible for the SGSI Periodic review 2023-12-13 3.0 \u00a0Responsible for the SGSI Revision and updating of the document Content Target The purpose of this document is to ... Read more","og_url":"https:\/\/profile.es\/politica-de-seguridad-de-informacion\/","og_site_name":"Profile Software Services","article_modified_time":"2024-06-05T14:52:55+00:00","twitter_card":"summary_large_image","twitter_site":"@EsProfile","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/profile.es\/politica-de-seguridad-de-informacion\/","url":"https:\/\/profile.es\/politica-de-seguridad-de-informacion\/","name":"Information Security Policy - Profile Software Services","isPartOf":{"@id":"\/#website"},"datePublished":"2024-02-07T13:28:43+00:00","dateModified":"2024-06-05T14:52:55+00:00","breadcrumb":{"@id":"https:\/\/profile.es\/politica-de-seguridad-de-informacion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/profile.es\/politica-de-seguridad-de-informacion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/profile.es\/politica-de-seguridad-de-informacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/profile.es\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security Policy"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"Profile Software Services","description":"","publisher":{"@id":"\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/#organization","name":"Profile Software Services","url":"\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/#\/schema\/logo\/image\/","url":"https:\/\/profile.es\/wp-content\/media\/logo-profile-1.png","contentUrl":"https:\/\/profile.es\/wp-content\/media\/logo-profile-1.png","width":500,"height":500,"caption":"Profile Software Services"},"image":{"@id":"\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/EsProfile","https:\/\/www.instagram.com\/esprofile\/","https:\/\/www.linkedin.com\/company\/profile-software-services\/","https:\/\/www.youtube.com\/channel\/UCs1Uk7DFBPrijU0bZ83kwHA"]}]}},"_links":{"self":[{"href":"https:\/\/profile.es\/en\/wp-json\/wp\/v2\/pages\/25658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/profile.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/profile.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/profile.es\/en\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/profile.es\/en\/wp-json\/wp\/v2\/comments?post=25658"}],"version-history":[{"count":31,"href":"https:\/\/profile.es\/en\/wp-json\/wp\/v2\/pages\/25658\/revisions"}],"predecessor-version":[{"id":41969,"href":"https:\/\/profile.es\/en\/wp-json\/wp\/v2\/pages\/25658\/revisions\/41969"}],"wp:attachment":[{"href":"https:\/\/profile.es\/en\/wp-json\/wp\/v2\/media?parent=25658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}