Information Security

Next, the security policies of our integrated management system (IMS) that G5 Integritas SRL defines, implements, operates and constantly improves are established.

  1. G5 INTEGRITAS SRL will protect against risk the information generated, processed or stored by the different processes, its technological infrastructure and assets that are generated from the accesses granted to third parties (eg: suppliers), or as a result of an internal or external service.
  2. G5 INTEGRITAS SRL will protect the confidentiality, integrity, availability and legality of the information generated, processed or stored by the different processes, in order to minimize financial, operational or legal impacts due to its incorrect use. For this, it is essential to apply controls according to the classification of the information owned or in custody.
  3. G5 INTEGRITAS SRL will protect your information against threats of internal or external origin to the organization.
  4. G5 INTEGRITAS SRL will protect the processing facilities and the technological infrastructure that supports its critical processes. G5 INTEGRITAS SRL controls the operation of its processes, guaranteeing the security of technological resources and data networks.
  5. G5 INTEGRITAS SRL will guarantee that security is an integral part of the life cycle of information systems through proper management of risks and weaknesses associated with information systems.
  6. G5 INTEGRITAS SRL will guarantee the availability of its processes and the continuity of its services based on the impact that adverse events may generate.
  7. G5 INTEGRITAS SRL will guarantee compliance with the established legal, regulatory and contractual obligations.
  8. Responsibilities for information security will be defined, shared, published and accepted by all interested parties.

     

    Pin It on Pinterest