{"id":1919,"date":"2023-03-07T20:25:29","date_gmt":"2023-03-07T20:25:29","guid":{"rendered":"https:\/\/policysense.com\/?page_id=1919"},"modified":"2023-06-13T20:58:09","modified_gmt":"2023-06-13T20:58:09","slug":"security-policy","status":"publish","type":"page","link":"https:\/\/www.policysense.com\/en\/security-policy\/","title":{"rendered":"Security policy"},"content":{"rendered":"<p><b>INFORMATION SECURITY AND CYBERSECURITY MANAGEMENT SYSTEM (ISMS)<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Information being an asset that is exposed to risks and threats in a constantly changing technological environment, and whose occurrence can generate a significant economic impact for In Motion and associated organizations, has considered relevant the implementation of an ISMS that allows protection from information assets properly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This policy is addressed to In Motion collaborators, its Suppliers, Information Assets of the company, and its clients that are under administration or with evolutionary support, applying the respective controls based on risk management and the respective information classification. .<\/span><\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><b>INFORMATION SECURITY AND CYBERSECURITY POLICY<\/b><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;At In Motion we are aware that Information Security and Cybersecurity are a fundamental component for the fulfillment of the strategic objectives of the organization, being one of the pillars of the Digital Transformation Process, and thus guarantee compliance with the principles of Confidentiality, Availability, and Integrity\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;This is why we assume the commitment to develop, maintain, and continuously improve an Information Security Management System aligned with the needs of the organization, our clients, and current legal regulations on the protection and security of assets. of information under our administration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Organization chooses to implement the ISO\/IEC 27001:2013 Standard and its dissemination among its collaborators, suppliers, and clients applying the virtuous circle of continuous improvement methodology to the system.<\/span><\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><b>INFORMATION SECURITY OBJECTIVES<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The objectives of Information Security and Cybersecurity are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Manage Risks at an acceptable Level through the maintenance of an information security management system and its respective controls.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Comply with the directives indicated in the ISO27001:2013 Information Security Standard, being its implementation in the interest of In Motion and its clients.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Document, Implement, and have a record of the Controls that correspond as a result of the risk analysis carried out on the information assets and that are part of the declaration of applicability.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Establish a Training and Awareness Plan in information security and cybersecurity that helps all the personnel involved to know and comply with the defined management activities and to participate proactively in security management.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>INFORMATION SECURITY AND CYBERSECURITY MANAGEMENT SYSTEM (ISMS) Information being an asset that is exposed to risks and threats in a constantly changing technological environment, and whose occurrence can generate a significant economic impact for In Motion and associated organizations, has considered relevant the implementation of an ISMS that allows protection from information assets properly. This [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-plantilla-terminos.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1919","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security and Cybersecurity Policy | policysense.com<\/title>\n<meta name=\"description\" content=\"Learn about Policysense&#039;s information security and cybersecurity policy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.policysense.com\/en\/security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security and Cybersecurity Policy | policysense.com\" \/>\n<meta property=\"og:description\" content=\"Learn about Policysense&#039;s information security and cybersecurity policy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.policysense.com\/en\/security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Policysense\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/grupoinmotionlat\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-13T20:58:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.policysense.com\/wp-content\/uploads\/2023\/03\/portada-policysense-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@grupoinmotion_\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security and Cybersecurity Policy | policysense.com","description":"Learn about Policysense's information security and cybersecurity policy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.policysense.com\/en\/security-policy\/","og_locale":"en_US","og_type":"article","og_title":"Security and Cybersecurity Policy | policysense.com","og_description":"Learn about Policysense's information security and cybersecurity policy","og_url":"https:\/\/www.policysense.com\/en\/security-policy\/","og_site_name":"Policysense","article_publisher":"https:\/\/www.facebook.com\/grupoinmotionlat","article_modified_time":"2023-06-13T20:58:09+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.policysense.com\/wp-content\/uploads\/2023\/03\/portada-policysense-.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@grupoinmotion_","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.policysense.com\/en\/security-policy\/","url":"https:\/\/www.policysense.com\/en\/security-policy\/","name":"Security and Cybersecurity Policy | policysense.com","isPartOf":{"@id":"https:\/\/www.policysense.com\/en\/#website"},"datePublished":"2023-03-07T20:25:29+00:00","dateModified":"2023-06-13T20:58:09+00:00","description":"Learn about Policysense's information security and cybersecurity policy","breadcrumb":{"@id":"https:\/\/www.policysense.com\/en\/security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.policysense.com\/en\/security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.policysense.com\/en\/security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.policysense.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security policy"}]},{"@type":"WebSite","@id":"https:\/\/www.policysense.com\/en\/#website","url":"https:\/\/www.policysense.com\/en\/","name":"Policysense | Transformaci\u00f3n digital para compa\u00f1\u00edas de seguros","description":"Policysense transformaci\u00f3n digital para compa\u00f1\u00edas de seguros de pr\u00f3xima generaci\u00f3n, nativas en la nube, modulares, basadas en Low-Code y m\u00e1s","publisher":{"@id":"https:\/\/www.policysense.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.policysense.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.policysense.com\/en\/#organization","name":"Policysense","url":"https:\/\/www.policysense.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.policysense.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.policysense.com\/wp-content\/uploads\/2024\/03\/logo-policysense-oficial.png","contentUrl":"https:\/\/www.policysense.com\/wp-content\/uploads\/2024\/03\/logo-policysense-oficial.png","width":367,"height":60,"caption":"Policysense"},"image":{"@id":"https:\/\/www.policysense.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/grupoinmotionlat","https:\/\/x.com\/grupoinmotion_","https:\/\/www.linkedin.com\/company\/grupoinmotion\/","https:\/\/www.instagram.com\/grupoinmotion_\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.policysense.com\/en\/wp-json\/wp\/v2\/pages\/1919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.policysense.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.policysense.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.policysense.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.policysense.com\/en\/wp-json\/wp\/v2\/comments?post=1919"}],"version-history":[{"count":1,"href":"https:\/\/www.policysense.com\/en\/wp-json\/wp\/v2\/pages\/1919\/revisions"}],"predecessor-version":[{"id":1920,"href":"https:\/\/www.policysense.com\/en\/wp-json\/wp\/v2\/pages\/1919\/revisions\/1920"}],"wp:attachment":[{"href":"https:\/\/www.policysense.com\/en\/wp-json\/wp\/v2\/media?parent=1919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}