{"id":9002,"date":"2025-11-17T14:57:28","date_gmt":"2025-11-17T14:57:28","guid":{"rendered":"https:\/\/eventomind.com\/?page_id=9002"},"modified":"2025-11-17T16:13:05","modified_gmt":"2025-11-17T16:13:05","slug":"pseguridad","status":"publish","type":"page","link":"https:\/\/eventomind.com\/en\/pseguridad\/","title":{"rendered":"Security policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"9002\" class=\"elementor elementor-9002\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0382d39 e-flex e-con-boxed e-con e-parent\" data-id=\"0382d39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b61986 elementor-widget elementor-widget-heading\" data-id=\"2b61986\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INFORMATION SECURITY POLICY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3337ffe elementor-widget elementor-widget-text-editor\" data-id=\"3337ffe\" data-element_type=\"widget\" data-e-type=\"widget\" data-no-translation=\"\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-element-3337ffe{display:none !important}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36f9000 elementor-widget elementor-widget-text-editor\" data-id=\"36f9000\" data-element_type=\"widget\" data-e-type=\"widget\" data-no-translation=\"\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"81\" data-end=\"151\"><strong data-start=\"81\" data-end=\"149\">Information Security Policy \u2013 Epika Comunicaci\u00f3n, S.L.U. (EPIKA)<\/strong><\/p><p data-start=\"153\" data-end=\"550\"><strong data-start=\"153\" data-end=\"169\">Introduction<\/strong><br data-start=\"169\" data-end=\"172\" \/>Epika Comunicaci\u00f3n, S.L.U. (hereinafter EPIKA) considers information\u2014particularly client-related information\u2014and its associated systems as critical assets that must be properly protected to ensure the correct functioning of the company. This security policy is aligned with <strong data-start=\"446\" data-end=\"468\">ISO\/IEC 27001:2022<\/strong>, for which EPIKA obtained certification on <strong data-start=\"512\" data-end=\"534\">September 19, 2025<\/strong> from Applus+.<\/p><p data-start=\"552\" data-end=\"927\">This security policy aims to ensure the <strong data-start=\"592\" data-end=\"649\">confidentiality, integrity, availability, and privacy<\/strong> of information, as well as compliance with applicable laws and requirements, maintaining a balance between risk levels and efficient use of resources based on proportionality principles. It also provides a reference framework for establishing information security objectives.<\/p><hr data-start=\"929\" data-end=\"932\" \/><p data-start=\"934\" data-end=\"1067\"><strong data-start=\"934\" data-end=\"996\">Scope of the Information Security Management System (ISMS)<\/strong><br data-start=\"996\" data-end=\"999\" \/>The ISMS supports processes, resources, and activities related to:<\/p><ul data-start=\"1069\" data-end=\"1464\"><li data-start=\"1069\" data-end=\"1171\"><p data-start=\"1071\" data-end=\"1171\">Planning, designing, executing, and evaluating advertising campaigns and communication strategies.<\/p><\/li><li data-start=\"1172\" data-end=\"1237\"><p data-start=\"1174\" data-end=\"1237\">Managing and administering social media on behalf of clients.<\/p><\/li><li data-start=\"1238\" data-end=\"1331\"><p data-start=\"1240\" data-end=\"1331\">Organizing and coordinating corporate and promotional events, both in-person and virtual.<\/p><\/li><li data-start=\"1332\" data-end=\"1464\"><p data-start=\"1334\" data-end=\"1464\">Processing information from clients, suppliers, and external collaborators, according to the current statement of applicability.<\/p><\/li><\/ul><p data-start=\"1466\" data-end=\"1653\">The policy emphasizes <strong data-start=\"1488\" data-end=\"1601\">personnel development, organizational belonging, resource optimization, process management, and risk analysis<\/strong> as essential elements for continuous improvement.<\/p><p data-start=\"1655\" data-end=\"1775\">EPIKA has aligned its ISMS with <strong data-start=\"1687\" data-end=\"1709\">ISO\/IEC 27001:2022<\/strong>, recognizing the need for internationally standardized systems.<\/p><hr data-start=\"1777\" data-end=\"1780\" \/><p data-start=\"1782\" data-end=\"1931\"><strong data-start=\"1782\" data-end=\"1807\">Management Commitment<\/strong><br data-start=\"1807\" data-end=\"1810\" \/>The Management commits to leading and maintaining an ISMS based on continuous improvement and the following principles:<\/p><ol data-start=\"1933\" data-end=\"2754\"><li data-start=\"1933\" data-end=\"2118\"><p data-start=\"1936\" data-end=\"2118\"><strong data-start=\"1936\" data-end=\"1977\">Understanding Needs and Expectations:<\/strong> Know client and stakeholder needs to ensure satisfaction and continuous improvement, periodically verifying the achievement of objectives.<\/p><\/li><li data-start=\"2119\" data-end=\"2209\"><p data-start=\"2122\" data-end=\"2209\"><strong data-start=\"2122\" data-end=\"2137\">Compliance:<\/strong> Adhere to applicable laws, regulations, and contractual requirements.<\/p><\/li><li data-start=\"2210\" data-end=\"2596\"><p data-start=\"2213\" data-end=\"2596\"><strong data-start=\"2213\" data-end=\"2238\">Information Security:<\/strong> Ensure the security of EPIKA\u2019s information and that of clients, recognizing that information systems, applications, communication infrastructures, files, and databases are critical company assets. Confidentiality, integrity, and availability of information are prioritized when defining objectives, responsibilities, and technical\/organizational measures.<\/p><\/li><li data-start=\"2597\" data-end=\"2754\"><p data-start=\"2600\" data-end=\"2754\"><strong data-start=\"2600\" data-end=\"2642\">Competence and Continuous Improvement:<\/strong> Continuously review skills and capabilities to maintain information security and meet growing client demands.<\/p><\/li><\/ol><hr data-start=\"2756\" data-end=\"2759\" \/><p data-start=\"2761\" data-end=\"2812\"><strong data-start=\"2761\" data-end=\"2810\">Principles of Information Security Management<\/strong><\/p><ul data-start=\"2814\" data-end=\"3745\"><li data-start=\"2814\" data-end=\"2972\"><p data-start=\"2816\" data-end=\"2972\">Ensure that EPIKA\u2019s information systems maintain an appropriate level of <strong data-start=\"2889\" data-end=\"2916\">security and resilience<\/strong> as recommended by the Information Security Committee.<\/p><\/li><li data-start=\"2973\" data-end=\"3135\"><p data-start=\"2975\" data-end=\"3135\">Raise awareness among all collaborators about security risks and provide necessary <strong data-start=\"3058\" data-end=\"3101\">training and technological capabilities<\/strong> to protect information systems.<\/p><\/li><li data-start=\"3136\" data-end=\"3306\"><p data-start=\"3138\" data-end=\"3306\">Provide procedures and tools for <strong data-start=\"3171\" data-end=\"3230\">analysis, prevention, detection, response, and recovery<\/strong>, enabling agile adaptation to technological changes and emerging threats.<\/p><\/li><li data-start=\"3307\" data-end=\"3431\"><p data-start=\"3309\" data-end=\"3431\">Collaborate with <strong data-start=\"3326\" data-end=\"3351\">governmental agencies<\/strong> to improve the company\u2019s security and ensure compliance with applicable laws.<\/p><\/li><li data-start=\"3432\" data-end=\"3524\"><p data-start=\"3434\" data-end=\"3524\">Define <strong data-start=\"3441\" data-end=\"3477\">clear roles and responsibilities<\/strong> for security within the corporate structure.<\/p><\/li><li data-start=\"3525\" data-end=\"3619\"><p data-start=\"3527\" data-end=\"3619\">Ensure all employees and collaborators diligently report <strong data-start=\"3584\" data-end=\"3616\">potential security incidents<\/strong>.<\/p><\/li><li data-start=\"3620\" data-end=\"3745\"><p data-start=\"3622\" data-end=\"3745\">Support a process for <strong data-start=\"3644\" data-end=\"3678\">continuous review and updating<\/strong> of the security management model to respond to evolving threats.<\/p><\/li><\/ul><hr data-start=\"3747\" data-end=\"3750\" \/><p data-start=\"3752\" data-end=\"3866\"><strong data-start=\"3752\" data-end=\"3769\">Applicability<\/strong><br data-start=\"3769\" data-end=\"3772\" \/>This policy applies to <strong data-start=\"3795\" data-end=\"3854\">all employees, executives, partners, and administrators<\/strong> of EPIKA.<\/p><p data-start=\"3868\" data-end=\"3941\">The policy is <strong data-start=\"3882\" data-end=\"3916\">reviewed and approved annually<\/strong> by EPIKA\u2019s Management.<\/p><p data-start=\"3943\" data-end=\"4076\">For additional information or suggestions regarding the information security policy, please contact <strong data-start=\"4043\" data-end=\"4073\"><a class=\"decorated-link cursor-pointer\" rel=\"noopener\" data-start=\"4045\" data-end=\"4071\">hola@epikacomunicacion.com<\/a><\/strong>.<\/p><p data-start=\"4078\" data-end=\"4112\"><strong data-start=\"4078\" data-end=\"4094\">Last update:<\/strong> October 1, 2025<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N Epika Comunicaci\u00f3n, S.L.U., en adelante EPIKA, considera que la informaci\u00f3n, en especial la relativa a clientes, y los distintos sistemas asociados son activos cr\u00edticos que deben ser protegidos adecuadamente para asegurar el correcto funcionamiento de la empresa, siempre adecuando dicha pol\u00edtica a la norma ISO\/IEC 27001:2022, cuya certificaci\u00f3n ha [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-9002","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/eventomind.com\/en\/wp-json\/wp\/v2\/pages\/9002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eventomind.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/eventomind.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/eventomind.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eventomind.com\/en\/wp-json\/wp\/v2\/comments?post=9002"}],"version-history":[{"count":10,"href":"https:\/\/eventomind.com\/en\/wp-json\/wp\/v2\/pages\/9002\/revisions"}],"predecessor-version":[{"id":9067,"href":"https:\/\/eventomind.com\/en\/wp-json\/wp\/v2\/pages\/9002\/revisions\/9067"}],"wp:attachment":[{"href":"https:\/\/eventomind.com\/en\/wp-json\/wp\/v2\/media?parent=9002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}