{"id":83,"date":"2025-07-15T08:43:56","date_gmt":"2025-07-15T08:43:56","guid":{"rendered":"https:\/\/wordpress.ecix.tech\/?page_id=83"},"modified":"2026-01-12T12:44:22","modified_gmt":"2026-01-12T11:44:22","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/ecix.tech\/en\/information-security-policy\/","title":{"rendered":"Information security policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"83\" class=\"elementor elementor-83\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4b4c7f4f elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"4b4c7f4f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;y&quot;:&quot;70px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-16514a3e\" data-id=\"16514a3e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-container&quot;,&quot;duration&quot;:1800,&quot;delay&quot;:180,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;y&quot;:&quot;50px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-750e9e26 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"750e9e26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69dc4f78b6137\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h6 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title ws-nowrap lqd-highlight-classic lqd-highlight-grow-left h6\"  > General principles of <br>information security<\/h6>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-17c693d8 e-flex e-con-boxed e-con e-parent\" data-id=\"17c693d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b23e3dd elementor-widget elementor-widget-text-editor\" data-id=\"1b23e3dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t\n<h1><span style=\"color: #294a2e;\"><strong>Information Security Policy<\/strong><\/span><\/h1>\n<p><span style=\"font-size: 16px;\">This Policy pursues the adoption, implementation and continued operation of actions aimed at preserving the basic components of information security:<\/span><\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Confidentiality<\/strong>: Ensure that only duly authorized persons have access to data and systems.<\/li>\n\n<li><strong>Integrity<\/strong>: Ensure the accuracy of information and systems against alteration, loss, or destruction, whether accidental or intentional.<\/li>\n\n<li><strong>Availability<\/strong>: Ensure that information and systems can be used in the manner and time required.<\/li>\n\n<li><strong>Resilience<\/strong>: Ensure the organization&#039;s ability to withstand and recover from disasters and disruptions, which involves continuous learning from critical situations that enable recovery from them under reinforced conditions.<\/li>\n\n<li>The Policy applies to all phases of the information lifecycle: generation, distribution, storage, processing, transportation, access, and destruction, and to the systems that process it: analysis, design, development, implementation, operation, and maintenance.<\/li>\n\n<li>Information security is the responsibility of all staff.\u00a0<strong>ECIX TECH<\/strong>Therefore, this Policy must be known, understood, and adopted by all levels of the organization. The Policy must be reliably communicated throughout the organization, both to its own staff and to external collaborating companies, and be available to interested parties.<\/li>\n\n<li>Relationships with third-party collaborators must always be covered by the corresponding service provision contracts, including clauses guaranteeing the use and processing of information.<\/li>\n<\/ul>\n<!-- \/wp:list --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\"><strong>1.1 APPLICATION OF THE SECURITY POLICY<\/strong><\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>In order to apply the principles outlined in this policy, the definition, development, implementation, and maintenance of Strategic Security Plans is required. The development of Strategic Security Plans must be accompanied by formal risk analysis and management processes that allow for the implementation of appropriate solutions.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>At the operational level,\u00a0<strong>ECIX TECH<\/strong>\u00a0It will develop its own security procedures, standards, and guides to ensure the integrity, confidentiality, availability, and resilience of the information.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>The necessary security management processes in line with the ISO 27001 standard and the National Security Scheme will be implemented to ensure effective and efficient monitoring of security actions, as well as review and improvement processes of security projects and defined countermeasures.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\">1.2 LEGAL COMPLIANCE<\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Due to the nature and purpose of the business of\u00a0<strong>ECIX TECH<\/strong>\u00a0Compliance with higher-ranking standards (laws, regulations and legal provisions) must be observed, which will take precedence when applicable over the guidelines of this information security policy:<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>General and\/or deontological standards of\u00a0<strong>ECIX TECH<\/strong>.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Spanish regulations governing this activity.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Spanish standards originating from supranational organizations of which Spain is a member.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Community and\/or non-Community regulations, depending on the areas of service provision by\u00a0<strong>ECIX TECH<\/strong>.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\">1.3 CLASSIFICATION AND PROCESSING OF INFORMATION<\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>All information must be classified according to its importance to the organization and must be treated accordingly, in accordance with the regulations on the classification and processing of information.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\">1.4 TRAINING AND AWARENESS RAISING<\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>The most effective way to improve safety is through ongoing training and its incorporation into the workplace.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>The training plans will include specific information security courses tailored to the target area: management, technicians, administrators, and system users. Security awareness campaigns will also be conducted for all staff and suppliers using the most effective means.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\">1.5 AUDIT<\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Information systems will be periodically audited internally and externally to verify the proper functioning of security plans, determine compliance levels, and recommend corrective measures, thereby achieving continuous improvement.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Date of update 12 January 2026.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>\u00a0<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>General principles of information security Information Security Policy This Policy aims at the adoption, implementation and continued operation of actions aimed at preserving the basic components of information security: 1.1 APPLICATION OF THE SECURITY POLICY In order to apply the principles set out in this policy, the following is specified: 1.2.1.<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-83","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pol\u00edtica seguridad de la informaci\u00f3n - ECIX TECH<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ecix.tech\/en\/information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pol\u00edtica seguridad de la informaci\u00f3n - ECIX TECH\" \/>\n<meta property=\"og:description\" content=\"Principios generales de seguridad de la informaci\u00f3n Pol\u00edtica Seguridad de la Informaci\u00f3n Esta Pol\u00edtica persigue la adopci\u00f3n, implantaci\u00f3n y operatividad continuada de acciones destinadas a preservar los componentes b\u00e1sicos de la seguridad de la informaci\u00f3n: 1.1 APLICACI\u00d3N DE LA POL\u00cdTICA DE SEGURIDAD Con objetivo de aplicar los principios expuestos en esta pol\u00edtica, se precisa la [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ecix.tech\/en\/information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"ECIX TECH\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T11:44:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/\",\"url\":\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/\",\"name\":\"Pol\u00edtica seguridad de la informaci\u00f3n - ECIX TECH\",\"isPartOf\":{\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#website\"},\"datePublished\":\"2025-07-15T08:43:56+00:00\",\"dateModified\":\"2026-01-12T11:44:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/54.247.110.102\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pol\u00edtica seguridad de la informaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#website\",\"url\":\"https:\/\/pl.nextlgsdp.com\/es\/\",\"name\":\"ECIX TECH\",\"description\":\"Servicios y soluciones para el cumplimiento normativo\",\"publisher\":{\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pl.nextlgsdp.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#organization\",\"name\":\"ECIX TECH\",\"url\":\"https:\/\/pl.nextlgsdp.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ecix.tech\/wp-content\/uploads\/2025\/07\/Ecixtech-scaled.png\",\"contentUrl\":\"https:\/\/ecix.tech\/wp-content\/uploads\/2025\/07\/Ecixtech-scaled.png\",\"width\":2560,\"height\":677,\"caption\":\"ECIX TECH\"},\"image\":{\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy - ECIX TECH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ecix.tech\/en\/information-security-policy\/","og_locale":"en_GB","og_type":"article","og_title":"Pol\u00edtica seguridad de la informaci\u00f3n - ECIX TECH","og_description":"Principios generales de seguridad de la informaci\u00f3n Pol\u00edtica Seguridad de la Informaci\u00f3n Esta Pol\u00edtica persigue la adopci\u00f3n, implantaci\u00f3n y operatividad continuada de acciones destinadas a preservar los componentes b\u00e1sicos de la seguridad de la informaci\u00f3n: 1.1 APLICACI\u00d3N DE LA POL\u00cdTICA DE SEGURIDAD Con objetivo de aplicar los principios expuestos en esta pol\u00edtica, se precisa la [&hellip;]","og_url":"https:\/\/ecix.tech\/en\/information-security-policy\/","og_site_name":"ECIX TECH","article_modified_time":"2026-01-12T11:44:22+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/","url":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/","name":"Information Security Policy - ECIX TECH","isPartOf":{"@id":"https:\/\/pl.nextlgsdp.com\/es\/#website"},"datePublished":"2025-07-15T08:43:56+00:00","dateModified":"2026-01-12T11:44:22+00:00","breadcrumb":{"@id":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/54.247.110.102\/es\/"},{"@type":"ListItem","position":2,"name":"Pol\u00edtica seguridad de la informaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/pl.nextlgsdp.com\/es\/#website","url":"https:\/\/pl.nextlgsdp.com\/es\/","name":"ECIX TECH","description":"Compliance services and solutions","publisher":{"@id":"https:\/\/pl.nextlgsdp.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pl.nextlgsdp.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/pl.nextlgsdp.com\/es\/#organization","name":"ECIX TECH","url":"https:\/\/pl.nextlgsdp.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/pl.nextlgsdp.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/ecix.tech\/wp-content\/uploads\/2025\/07\/Ecixtech-scaled.png","contentUrl":"https:\/\/ecix.tech\/wp-content\/uploads\/2025\/07\/Ecixtech-scaled.png","width":2560,"height":677,"caption":"ECIX TECH"},"image":{"@id":"https:\/\/pl.nextlgsdp.com\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ecix.tech\/en\/wp-json\/wp\/v2\/pages\/83","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ecix.tech\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ecix.tech\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ecix.tech\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ecix.tech\/en\/wp-json\/wp\/v2\/comments?post=83"}],"version-history":[{"count":26,"href":"https:\/\/ecix.tech\/en\/wp-json\/wp\/v2\/pages\/83\/revisions"}],"predecessor-version":[{"id":32405,"href":"https:\/\/ecix.tech\/en\/wp-json\/wp\/v2\/pages\/83\/revisions\/32405"}],"wp:attachment":[{"href":"https:\/\/ecix.tech\/en\/wp-json\/wp\/v2\/media?parent=83"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}