{"id":32020,"date":"2023-09-20T12:28:16","date_gmt":"2023-09-20T17:28:16","guid":{"rendered":"https:\/\/bmotik.com\/?page_id=32020"},"modified":"2024-02-08T18:10:20","modified_gmt":"2024-02-08T23:10:20","slug":"politica-de-seguridad-de-la-informacion","status":"publish","type":"page","link":"https:\/\/bmotik.com\/en\/acuerdos\/politica-de-seguridad-de-la-informacion\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"32020\" class=\"elementor elementor-32020\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5dbe218 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5dbe218\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-08660ca\" data-id=\"08660ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68b85b3 elementor-widget elementor-widget-heading\" data-id=\"68b85b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bmotik Information Security Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06ddd1f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"06ddd1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/bmotik.com\/acuerdos\/politica-de-acceso-remoto-bmotik\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-layer-group\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">View remote access policies - bmotik<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0dfc5c elementor-widget elementor-widget-text-editor\" data-id=\"b0dfc5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>1. Objective<\/strong>&nbsp;The main objective of this policy is to ensure the protection, integrity and availability of confidential information and services that our SaaS company provides to our customers. We seek to prevent unauthorized access, misuse, disclosure, alteration and destruction of information.<\/p>\n<p><strong>2. Scope<\/strong>&nbsp;This policy applies to all employees, contractors, consultants and third parties who have access to company systems and networks. This includes anyone who processes, stores or transmits information on behalf of the company.<\/p>\n<p><strong>3. Responsibilities<\/strong>&nbsp;All employees are responsible for protecting the information to which they have access. Any violation of this policy may result in disciplinary action, up to and including termination.<\/p>\n<p><strong>Access Management<\/strong>&nbsp;Access to systems and data will be controlled on a \"need to know\" basis. Employees shall only have access to the information they need to perform their duties. All access will be logged and reviewed regularly by the security committee and\/or internal auditor to detect any suspicious activity.<\/p>\n<p><strong style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-size: 1rem;\">5. Data Protection<\/strong><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\"> All data stored on our systems will be encrypted at rest and in transit using strong encryption algorithms. Regular (weekly) backups will be performed and tested to ensure that they can be recovered in the event of data loss. In addition, we will implement measures to protect against malware and cyber attacks, including, but not limited to, the following:<\/span><\/p>\n<ul>\n<li>\n<p>Use licensed software and if it is SaaS, use software that complies with European or American security standards and regulations.<\/p>\n<\/li>\n<li>\n<p>Keep the system and applications up to date: Updates often include security patches for newly discovered vulnerabilities.<\/p>\n<\/li>\n<li>\n<p>When handling sensitive data, bmotik's virtual private network (VPN) should be used.<\/p>\n<\/li>\n<li>\n<p>Keep the firewall enabled.<\/p>\n<\/li>\n<li>\n<p><span style=\"background-color: transparent; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">Be cautious with suspicious e-mails and links, avoiding<\/span><span style=\"background-color: transparent; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">&nbsp;cyber attacks that start with a phishing email or a malicious link. Only confirm in emails sent from the same organization and opt for a posture of constant suspicion and verification. In case of any doubt about an email, ask the security committee.<\/span><\/p>\n<\/li>\n<li>\n<p>Perform regular data backups on a weekly basis in the case of customers and monthly in the case of bmotik internal data.<\/p>\n<\/li>\n<li>\n<p>Implement two-factor authentication on all accounts related to bmotik, its customers and suppliers.<\/p>\n<\/li>\n<li>\n<p>Train employees on cyber security, keeping employees informed about cyber security best practices, such as not sharing passwords or opening suspicious emails.<\/p>\n<\/li>\n<li>\n<p>Monitoring the network regularly, maintaining early detection of suspicious activity can prevent a large-scale attack.<\/p>\n<\/li>\n<li>\n<p>Maintain the incident response plan up to date.<\/p>\n<\/li>\n<\/ul>\n<div>\n<p style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; margin: 1.25em 0px; color: #374151; font-family: S\u00f6hne, ui-sans-serif, system-ui, -apple-system, 'Segoe UI', Roboto, Ubuntu, Cantarell, 'Noto Sans', sans-serif, 'Helvetica Neue', Arial, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji'; white-space-collapse: preserve;\"><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; font-weight: 600; color: var(--tw-prose-bold);\">5.1<\/span><span style=\"color: var(--tw-prose-bold); font-weight: 600; font-size: 1rem;\">. Prohibition of Removable Media: <\/span><span style=\"font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">As part of our commitment to robust data security, the use of removable media, including but not limited to USB drives, external hard drives and other portable storage devices, to manage customer data is strictly prohibited.<\/span><\/p>\n<p style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; margin: 1.25em 0px; color: #374151; font-family: S\u00f6hne, ui-sans-serif, system-ui, -apple-system, 'Segoe UI', Roboto, Ubuntu, Cantarell, 'Noto Sans', sans-serif, 'Helvetica Neue', Arial, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji'; white-space-collapse: preserve;\"><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; font-weight: 600; color: var(--tw-prose-bold);\">5.1.1. Alternative Safe Alternative Methods: <\/span>To facilitate the secure management of customer data, Bmotik has established alternative methods for data transfer, storage and exchange. These approved methods adhere to industry best practices and encryption standards to ensure the confidentiality and integrity of customer information.<\/p>\n<p style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; margin: 0px 0px 1.25em; color: #374151; font-family: S\u00f6hne, ui-sans-serif, system-ui, -apple-system, 'Segoe UI', Roboto, Ubuntu, Cantarell, 'Noto Sans', sans-serif, 'Helvetica Neue', Arial, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji'; white-space-collapse: preserve;\"><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; font-weight: 600; color: var(--tw-prose-bold);\">5.2. Prohibition of Sharing User Accounts: <\/span><span style=\"border: 0px solid rgb(217, 217, 227); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent;\">As part of Bmotik's commitment to maintaining sound information security practices, the o<\/span><span style=\"border: 0px solid rgb(217, 217, 227); --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent;\">rganization strictly prohibits the sharing of user accounts among multiple individuals. Each user account is designated for individual use and is not transferable. <\/span>Bmotik employees and authorized users are expressly prohibited from sharing their assigned user accounts with others. A user account is intended for the exclusive use of the individual to whom it is assigned and must not be shared, transferred or used by anyone else.<\/p>\n<p style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; margin: 1.25em 0px; color: #374151; font-family: S\u00f6hne, ui-sans-serif, system-ui, -apple-system, 'Segoe UI', Roboto, Ubuntu, Cantarell, 'Noto Sans', sans-serif, 'Helvetica Neue', Arial, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji'; white-space-collapse: preserve;\"><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; font-weight: 600; color: var(--tw-prose-bold);\">5.2.1. Individual Responsibility: <\/span><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent;\">Each user is individually responsible for activities performed using their assigned user account credentials. Sharing user accounts undermines established security and accountability measures and increases the risk of unauthorized access to sensitive information.<\/span><\/p>\n<p style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; margin: 1.25em 0px; color: #374151; font-family: S\u00f6hne, ui-sans-serif, system-ui, -apple-system, 'Segoe UI', Roboto, Ubuntu, Cantarell, 'Noto Sans', sans-serif, 'Helvetica Neue', Arial, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji'; white-space-collapse: preserve;\"><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; font-weight: 600; color: var(--tw-prose-bold);\">5.2.2. User Authentication: <\/span><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent;\">Users must authenticate using their unique credentials when accessing Bmotik systems, applications and resources. Sharing user accounts compromises the integrity of the authentication process and may result in unauthorized access. All accounts must use MFA.<\/span><\/p>\n<p style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; margin: 1.25em 0px; color: #374151; font-family: S\u00f6hne, ui-sans-serif, system-ui, -apple-system, 'Segoe UI', Roboto, Ubuntu, Cantarell, 'Noto Sans', sans-serif, 'Helvetica Neue', Arial, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji'; white-space-collapse: preserve;\"><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; font-weight: 600; color: var(--tw-prose-bold);\">5.2.3. Safety Implications: <\/span><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent;\">Sharing user accounts poses significant security risks, including, but not limited to, unauthorized access, data breaches, and the inability to accurately trace actions to specific individuals. It also violates the principle of least privilege by allowing individuals access beyond their authorized permissions.<\/span><\/p>\n<p style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; margin: 1.25em 0px; color: #374151; font-family: S\u00f6hne, ui-sans-serif, system-ui, -apple-system, 'Segoe UI', Roboto, Ubuntu, Cantarell, 'Noto Sans', sans-serif, 'Helvetica Neue', Arial, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji'; white-space-collapse: preserve;\"><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent; font-weight: 600; color: var(--tw-prose-bold);\">5.2.4. Consequences of the Violation: <\/span><span style=\"border: 0px solid #d9d9e3; --tw-border-spacing-x: 0; --tw-border-spacing-y: 0; --tw-translate-x: 0; --tw-translate-y: 0; --tw-rotate: 0; --tw-skew-x: 0; --tw-skew-y: 0; --tw-scale-x: 1; --tw-scale-y: 1; --tw-scroll-snap-strictness: proximity; --tw-ring-offset-width: 0px; --tw-ring-offset-color: #fff; --tw-ring-color: rgba(69,89,164,.5); --tw-ring-offset-shadow: 0 0 transparent; --tw-ring-shadow: 0 0 transparent; --tw-shadow: 0 0 transparent; --tw-shadow-colored: 0 0 transparent;\">Violations of this policy will result in disciplinary action, which may include written warnings, suspension of account privileges or termination of employment, depending on the severity and recurrence of the violation. In addition, in cases where the violation leads to unauthorized access or compromises sensitive information, legal action may be taken.<\/span><\/p>\n<\/div>\n<p><strong>6. Incident Management<\/strong>&nbsp;Any security incident must be reported immediately to the security team or committee. An investigation will be conducted and steps will be taken to prevent future incidents. This may include changes to policies and procedures, additional training or improvements to security measures.<\/p>\n<p>The standard information security incident response plan is described below:<\/p>\n<ul>\n<li>Preparedness: Before an incident occurs, all employees should be present and responsible for the training program of the personnel, the definition of roles and responsibilities, and the preparation of automatic monitoring tools available to the company and any other necessary resources. Recognizing the security committee, its communication channels and the company's policies regarding information security.<\/li>\n<li>2. Identification: The first step in responding to an incident is to identify that an incident has occurred. This may involve detecting suspicious activity, receiving reports from users or customers, or identifying a policy violation. As well as immediate notification to the security committee and then from this committee to the customer within 24 hours of the event.<\/li>\n<li>3. Containment: Once an incident has been identified, the immediate goal is to contain it to minimize the damage. This may involve shutting down affected systems or networks, revoking user access or changing passwords.<\/li>\n<li>4. Eradication: After containing the incident, the next step is to eradicate the cause of the incident. This may involve removing malware, fixing vulnerabilities or implementing new security measures.<\/li>\n<li>5. Recovery: Once the cause of the incident has been eradicated, systems and networks can be restored to normal operation. This must be done in a controlled manner to prevent the incident from recurring.<\/li>\n<li>6. Lessons Learned: After an incident has been resolved, it is important to review what happened and why it happened. This may involve a post-incident review, a security audit or a review of existing policies and procedures.<\/li>\n<li>7. Communication: Throughout the process, it is important to communicate effectively with all stakeholders. This may include employees, customers and regulatory authorities. Official company channels should be used for such communication and conversations via telephone or instant messaging should be avoided as much as possible.<\/li>\n<\/ul>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><strong>7. Compliance<\/strong>&nbsp;The company will comply with all applicable laws and regulations related to information security and privacy. This includes the General Data Protection Regulation (GDPR), the Personal Data Protection Act (LPPD) and other relevant local and international laws.<\/p>\n<p><strong>8. Review and Update<\/strong>&nbsp;This policy will be reviewed and updated regularly, at least once a year or when significant changes occur in our business or in applicable laws and regulations.<\/p>\n<p><strong>9. Training<\/strong>&nbsp;All employees will receive regular information security training to ensure that they understand their responsibilities. This training will cover topics such as secure information handling, how to detect and report security incidents, and how to keep systems and data secure.<\/p>\n<p><strong>10. Security Committee<\/strong> A Security Committee will be formed comprised of key business representatives, including but not limited to IT, Legal, Operations and Finance. This committee will be responsible for the development, implementation and periodic, minimum annual oversight of the security program.<\/p>\n<p>Communication with the safety committee shall be made through the following e-mail address: datos@bmotik.com or through the official communication channels enabled by the company.<\/p>\n<p><strong>11. Internal Audit<\/strong>&nbsp;Regular internal audits will be conducted to ensure compliance with this policy and to identify any areas requiring improvement.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a15a326 elementor-widget elementor-widget-text-editor\" data-id=\"a15a326\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Last modified February 5, 2024<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Bmotik Information Security Policy See remote access policies - bmotik 1. Objective The main objective of this policy is to ensure the protection, integrity and availability of confidential information and services that our SaaS company provides to our customers. We seek to prevent unauthorized access, misuse, disclosure, misappropriation, [...]<\/p>","protected":false},"author":1,"featured_media":0,"parent":31865,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"footnotes":""},"class_list":["post-32020","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pol\u00edtica de Seguridad de la Informaci\u00f3n &#8226; Bmotik<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bmotik.com\/en\/acuerdos\/politica-de-seguridad-de-la-informacion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pol\u00edtica de Seguridad de la Informaci\u00f3n\" \/>\n<meta property=\"og:description\" content=\"Pol\u00edtica de Seguridad de la Informaci\u00f3n Bmotik Ver pol\u00edticas de acceso remoto &#8211; bmotik 1. Objetivo&nbsp;El objetivo principal de esta pol\u00edtica es garantizar la protecci\u00f3n, integridad y disponibilidad de la informaci\u00f3n confidencial y los servicios que nuestra empresa SaaS proporciona a nuestros clientes. Buscamos prevenir el acceso no autorizado, el uso indebido, la divulgaci\u00f3n, la [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bmotik.com\/en\/acuerdos\/politica-de-seguridad-de-la-informacion\/\" \/>\n<meta property=\"og:site_name\" content=\"Bmotik\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bmotik?fref=ts\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-08T23:10:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@bmotik_co\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/\",\"url\":\"https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/\",\"name\":\"Pol\u00edtica de Seguridad de la Informaci\u00f3n &#8226; Bmotik\",\"isPartOf\":{\"@id\":\"https:\/\/bmotik.com\/#website\"},\"datePublished\":\"2023-09-20T17:28:16+00:00\",\"dateModified\":\"2024-02-08T23:10:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/bmotik.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Acuerdos\",\"item\":\"https:\/\/bmotik.com\/acuerdos\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Pol\u00edtica de Seguridad de la Informaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bmotik.com\/#website\",\"url\":\"https:\/\/bmotik.com\/\",\"name\":\"Bmotik\",\"description\":\"Plataforma para Eventos sin L\u00edmites\",\"publisher\":{\"@id\":\"https:\/\/bmotik.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bmotik.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bmotik.com\/#organization\",\"name\":\"bmotik\",\"url\":\"https:\/\/bmotik.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bmotik.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bmotik.com\/wp-content\/uploads\/2023\/01\/bmotik-logo-def-bk.png\",\"contentUrl\":\"https:\/\/bmotik.com\/wp-content\/uploads\/2023\/01\/bmotik-logo-def-bk.png\",\"width\":850,\"height\":213,\"caption\":\"bmotik\"},\"image\":{\"@id\":\"https:\/\/bmotik.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/bmotik?fref=ts\",\"https:\/\/x.com\/bmotik_co\",\"https:\/\/www.linkedin.com\/company\/bmotik\/\",\"https:\/\/www.instagram.com\/bmotik_co\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pol\u00edtica de Seguridad de la Informaci\u00f3n &#8226; Bmotik","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bmotik.com\/en\/acuerdos\/politica-de-seguridad-de-la-informacion\/","og_locale":"en_US","og_type":"article","og_title":"Pol\u00edtica de Seguridad de la Informaci\u00f3n","og_description":"Pol\u00edtica de Seguridad de la Informaci\u00f3n Bmotik Ver pol\u00edticas de acceso remoto &#8211; bmotik 1. Objetivo&nbsp;El objetivo principal de esta pol\u00edtica es garantizar la protecci\u00f3n, integridad y disponibilidad de la informaci\u00f3n confidencial y los servicios que nuestra empresa SaaS proporciona a nuestros clientes. Buscamos prevenir el acceso no autorizado, el uso indebido, la divulgaci\u00f3n, la [&hellip;]","og_url":"https:\/\/bmotik.com\/en\/acuerdos\/politica-de-seguridad-de-la-informacion\/","og_site_name":"Bmotik","article_publisher":"https:\/\/www.facebook.com\/bmotik?fref=ts","article_modified_time":"2024-02-08T23:10:20+00:00","twitter_card":"summary_large_image","twitter_site":"@bmotik_co","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/","url":"https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/","name":"Pol\u00edtica de Seguridad de la Informaci\u00f3n &#8226; Bmotik","isPartOf":{"@id":"https:\/\/bmotik.com\/#website"},"datePublished":"2023-09-20T17:28:16+00:00","dateModified":"2024-02-08T23:10:20+00:00","breadcrumb":{"@id":"https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bmotik.com\/acuerdos\/politica-de-seguridad-de-la-informacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/bmotik.com\/"},{"@type":"ListItem","position":2,"name":"Acuerdos","item":"https:\/\/bmotik.com\/acuerdos\/"},{"@type":"ListItem","position":3,"name":"Pol\u00edtica de Seguridad de la Informaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/bmotik.com\/#website","url":"https:\/\/bmotik.com\/","name":"Bmotik","description":"Platform for Limitless Events","publisher":{"@id":"https:\/\/bmotik.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bmotik.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bmotik.com\/#organization","name":"bmotik","url":"https:\/\/bmotik.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bmotik.com\/#\/schema\/logo\/image\/","url":"https:\/\/bmotik.com\/wp-content\/uploads\/2023\/01\/bmotik-logo-def-bk.png","contentUrl":"https:\/\/bmotik.com\/wp-content\/uploads\/2023\/01\/bmotik-logo-def-bk.png","width":850,"height":213,"caption":"bmotik"},"image":{"@id":"https:\/\/bmotik.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bmotik?fref=ts","https:\/\/x.com\/bmotik_co","https:\/\/www.linkedin.com\/company\/bmotik\/","https:\/\/www.instagram.com\/bmotik_co\/"]}]}},"_links":{"self":[{"href":"https:\/\/bmotik.com\/en\/wp-json\/wp\/v2\/pages\/32020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bmotik.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bmotik.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bmotik.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bmotik.com\/en\/wp-json\/wp\/v2\/comments?post=32020"}],"version-history":[{"count":0,"href":"https:\/\/bmotik.com\/en\/wp-json\/wp\/v2\/pages\/32020\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/bmotik.com\/en\/wp-json\/wp\/v2\/pages\/31865"}],"wp:attachment":[{"href":"https:\/\/bmotik.com\/en\/wp-json\/wp\/v2\/media?parent=32020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}