{"id":356,"date":"2022-05-13T09:46:34","date_gmt":"2022-05-13T09:46:34","guid":{"rendered":"https:\/\/home.b2b.systems\/?page_id=356"},"modified":"2022-05-13T09:47:20","modified_gmt":"2022-05-13T09:47:20","slug":"security-of-the-information","status":"publish","type":"page","link":"https:\/\/home.b2b.systems\/?page_id=356","title":{"rendered":"Security of the information"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"356\" class=\"elementor elementor-356\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71f97d8 elementor-section-height-min-height elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"71f97d8\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5f13fa\" data-id=\"e5f13fa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6518f4 elementor-widget elementor-widget-heading\" data-id=\"c6518f4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security of the information<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c547aed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c547aed\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b07b18\" data-id=\"2b07b18\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44bf5dc elementor-widget elementor-widget-text-editor\" data-id=\"44bf5dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ol><li style=\"font-weight: 400;\"><p style=\"font-weight: 400;\">Due to our\u00a0<strong>Software Consultancy Activities<\/strong>\u00a0(from installation and configuration of\u00a0products purchased by the client to consultancy, auditing, software design and\u00a0development, additional product developments for the \u201ccustomisation\u201d of the tools,\u00a0among others), at\u00a0<strong>B2B SOLUTIONS<\/strong>\u00a0we understand that information is a highly valuable\u00a0asset for both our organisation and our clients. For this reason, proper protection and\u00a0management is required in order to ensure continuity for our business line and\u00a0minimize potential damage due to breaches with respect to the integrity, availability<br \/>and confidentiality of information.<\/p><p style=\"font-weight: 400;\">In order to do this,\u00a0<strong>B2B SOLUTIONS<\/strong>\u00a0makes the following commitments:<\/p><ul style=\"font-weight: 400;\"><li><strong><em>B2B SOLUTIONS<\/em><\/strong><em>\u2019 ongoing efforts in the area of Information Security Management shall be demonstrated through training and awareness programmes that promote participatory management in these areas, enabling staff skills to be used for the continuous improvement of the production process.<\/em><\/li><li><em>In order to ensure that its activities are carried out in accordance with the\u00a0applicable rules and regulations, the law shall be complied with, as well as other requirements agreed with clients, including those concerning Information<\/em><br \/><em>Security.<\/em><\/li><li><em>To meet the requirements and continuously improve the effectiveness of the Information Security Management System, by implementing systems to\u00a0measure and monitor solutions and developments carried out for our clients, as well as Information Security objectives.<\/em><\/li><li><em>To ensure business continuity by developing continuity plans in accordance with recognized methodologies.<\/em><\/li><li><em>To conduct and periodically review a risk analysis based on recognized methodologies that allow us to establish the level of information security and\u00a0minimize risks by developing specific policies, technical solutions and contractual agreements with specialist organizations.<\/em><\/li><li><strong><em>B2B SOLUTIONS<\/em><\/strong><em>\u00a0staff will carry out their work aiming to achieve the objectives specified and in accordance with legal requirements at all times.<\/em><\/li><\/ul><p style=\"font-weight: 400;\">This policy will be reviewed at least once a year.<\/p><p style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a0Management Team<\/p><p style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a010\/08\/2020\u00a0\u00a0<\/p><\/li><\/ol>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security of the information Due to our\u00a0Software Consultancy Activities\u00a0(from installation and configuration of\u00a0products purchased by the client to consultancy, auditing, software design and\u00a0development, additional product developments for the \u201ccustomisation\u201d of the tools,\u00a0among others), at\u00a0B2B SOLUTIONS\u00a0we understand that information is a highly valuable\u00a0asset for both our organisation and our clients. For this reason, proper protection and\u00a0management &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/home.b2b.systems\/?page_id=356\" class=\"more-link\">Continuar leyendo<span class=\"screen-reader-text\"> &#8220;Security of the information&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/home.b2b.systems\/index.php?rest_route=\/wp\/v2\/pages\/356"}],"collection":[{"href":"https:\/\/home.b2b.systems\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/home.b2b.systems\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/home.b2b.systems\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/home.b2b.systems\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=356"}],"version-history":[{"count":4,"href":"https:\/\/home.b2b.systems\/index.php?rest_route=\/wp\/v2\/pages\/356\/revisions"}],"predecessor-version":[{"id":360,"href":"https:\/\/home.b2b.systems\/index.php?rest_route=\/wp\/v2\/pages\/356\/revisions\/360"}],"wp:attachment":[{"href":"https:\/\/home.b2b.systems\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}