{"id":22928,"date":"2022-02-24T13:01:49","date_gmt":"2022-02-24T13:01:49","guid":{"rendered":"https:\/\/www.neodoc.es\/information-security-policy\/"},"modified":"2022-05-09T15:09:10","modified_gmt":"2022-05-09T15:09:10","slug":"information_security_policy","status":"publish","type":"page","link":"https:\/\/www.neodoc.es\/en\/information_security_policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<section  class='av_textblock_section av-kysvijko-494652943c13c28491b7659a1caa5244 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock '  itemprop=\"text\" ><h2 style=\"color: #000 !important; text-align: left !important; padding-left: 0px; max-width: none !important;\">Pol\u00edtica de seguridad de la informaci\u00f3n<\/h2>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\"><b>NEO INGENIERIA INFORMATICA, S.L. (NEOSYSTEMS)<\/b> has an Information Security Management System based on ISO 27001, in his current revision, whose scope is: the information systems provide support to the development activity, commercialization and maintenance of NEODOC software.<\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\">The definition of our Information Security policy is based on the analysis of our mission, vision and values:<\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\"><b>MISSION<\/b><\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\">Improve life quality and profitability of our clients by automating and digitally transforming their business processes.<\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\">Our entity develops <span style=\"font-size: medium;\"><b>NEODOC<\/b>, a platform that allows building business management processes products and that aims to be a reference in acceleration and digital transformation of the business content processes market.<\/span><\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\"><b>VISION<\/b><\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\">To be a benchmark company  in business content management, based on products for service-oriented business models.<\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\">We have a human team with high qualification, knowledge and involvement with a clear commitment to keep the security of the information they use in the development of products and projects and in the organization management.<\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\">Protect all the information for which <b>NEOSYSTEMS<\/b> is responsible, giving it the appropriate use, and preventing any type of loss, damage, misuse, etc. that could occur in the development of our activity.<\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\"><b>NEOSYSTEMS<\/b> management is totally committed to:<\/p>\n<ul style=\"text-align: left; padding-left: 5px; font-size: 14px;\">\n<li>Legal and regulation compliance of the application, as well as the compliance of the requirements established in our management system and for our clients and interested parties.<\/li>\n<li>Continuously improving our Information Security Management System.<\/li>\n<li>Establishment of Information Security objectives consistent with this policy. Those objectives will aim to guarantee information security in three dimensions: confidentiality, availability and integrity.<\/li>\n<\/ul>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\">This policy will be communicated and available  for all the interested parties.<br \/>\n<span style=\"font-size: medium;\">.<\/span><\/p>\n<p style=\"text-align: left; padding-left: 0px; max-width: none !important; font-size: 14px;\"><b>VALUES<\/b><\/p>\n<ul style=\"text-align: left; padding-left: 5px; font-size: 14px;\">\n<li>Professionalism<\/li>\n<li>Empathy<\/li>\n<li>Integrity<\/li>\n<li>Balance<\/li>\n<li>Excellence<\/li>\n<li>Security<\/li>\n<\/ul>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-22928","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Policy - neodoc<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy - neodoc\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.neodoc.es\/en\/information_security_policy\/\" \/>\n<meta property=\"og:site_name\" content=\"neodoc\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-09T15:09:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.neodoc.es\\\/en\\\/information_security_policy\\\/\",\"url\":\"https:\\\/\\\/www.neodoc.es\\\/en\\\/information_security_policy\\\/\",\"name\":\"Information Security Policy - neodoc\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.neodoc.es\\\/en\\\/#website\"},\"datePublished\":\"2022-02-24T13:01:49+00:00\",\"dateModified\":\"2022-05-09T15:09:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.neodoc.es\\\/en\\\/information_security_policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.neodoc.es\\\/en\\\/information_security_policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.neodoc.es\\\/en\\\/information_security_policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.neodoc.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.neodoc.es\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.neodoc.es\\\/en\\\/\",\"name\":\"neodoc\",\"description\":\"Automatizaci\u00f3n real de la gesti\u00f3n documental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.neodoc.es\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy - neodoc","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Information Security Policy - neodoc","og_url":"https:\/\/www.neodoc.es\/en\/information_security_policy\/","og_site_name":"neodoc","article_modified_time":"2022-05-09T15:09:10+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.neodoc.es\/en\/information_security_policy\/","url":"https:\/\/www.neodoc.es\/en\/information_security_policy\/","name":"Information Security Policy - neodoc","isPartOf":{"@id":"https:\/\/www.neodoc.es\/en\/#website"},"datePublished":"2022-02-24T13:01:49+00:00","dateModified":"2022-05-09T15:09:10+00:00","breadcrumb":{"@id":"https:\/\/www.neodoc.es\/en\/information_security_policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.neodoc.es\/en\/information_security_policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.neodoc.es\/en\/information_security_policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.neodoc.es\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.neodoc.es\/en\/#website","url":"https:\/\/www.neodoc.es\/en\/","name":"neodoc","description":"Automatizaci\u00f3n real de la gesti\u00f3n documental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.neodoc.es\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.neodoc.es\/en\/wp-json\/wp\/v2\/pages\/22928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.neodoc.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.neodoc.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.neodoc.es\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.neodoc.es\/en\/wp-json\/wp\/v2\/comments?post=22928"}],"version-history":[{"count":13,"href":"https:\/\/www.neodoc.es\/en\/wp-json\/wp\/v2\/pages\/22928\/revisions"}],"predecessor-version":[{"id":23080,"href":"https:\/\/www.neodoc.es\/en\/wp-json\/wp\/v2\/pages\/22928\/revisions\/23080"}],"wp:attachment":[{"href":"https:\/\/www.neodoc.es\/en\/wp-json\/wp\/v2\/media?parent=22928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}