Information Security Policy

Information Security is a top priority in order to:
- Ensure the company's full compliance with relevant legal and regulatory requirements,
- To protect the interests of the company and those who deal with and trust the company for the use and handling of their confidential data
- To ensure the availability, integrity and confidentiality of information generated, received and handled in the context of security projects.
- To maximise the reliability of the company's information resources.

The implementation of the QMS aims to:
- Protect the retained file, computing resources and information in transit in the company's services from any threat, internal or external, intentional or accidental,
- Systematic assessment and evaluation of risks related to information security, looking forward to their correct and timely management,
- Archiving data, preventing viruses and external intrusions, controlling access to systems, recording all security incidents and managing unexpected developments,
- Keeping management and staff up to date on information security issues and conducting training seminars for staff,
- Full commitment of the company's management to the faithful implementation and continuous improvement of the QMS, which complies with the requirements of ISO 27001:2013.

The Information Security Management Officer is responsible for controlling and monitoring the operation of the ISMS, as well as for informing all involved personnel about the Information Security Policy.

All personnel involved in the activities and processes described and related to Information Security are responsible for implementing the ISMS policy and related Procedures in their area of work.

Management and all employees are committed to achieving the Company's objectives and adhering to the principles in relation to Information Security.

In order to achieve the above, the Company implements an Information Security Management System in accordance with EN ISO 27001:2013.