Security of the information
Information Security Policy and Business Continuity::
GRUPO PHOENIX firmly believes that Information Security and Business Continuity are crucial factors for the proper development of the company. It considers that, alongside the provision of training and the necessary resources for conducting its activities, these are the primary pillars for offering clients services of the appropriate quality.
GRUPO PHOENIX acknowledges the importance of ensuring the confidentiality, integrity, and availability of information. These principles are defined as follows:
-
Confidentiality: We commit to protecting information against unauthorized access, ensuring that only authorized individuals have access to the relevant information needed to perform their duties.
-
Integrity: We commit to maintaining the accuracy and completeness of information, preventing unauthorized alteration, destruction, or modification.
-
Availability: We commit to ensuring that information is available and accessible to authorized users when needed, avoiding unplanned interruptions and minimizing downtime.
The objectives of the Information Security and Business Continuity Management System include:
-
Ensuring compliance with relevant legislation, regulations, and standards, as well as any other requirements that GRUPO PHOENIX deems necessary for continuous improvement.
-
Providing services with a level of security that meets and exceeds our customers' expectations.
-
Training staff in accordance with technical changes and technological innovations affecting GRUPO PHOENIX's activities.
-
Effectively assigning roles and responsibilities within the realm of security.
-
Preventing potential information security defects and incidents before they occur, working towards "continuous improvement" and effective communication.
-
Continually evolving the Information Security and Business Continuity Management System to meet our customers' demands.
-
Raising awareness and motivating GRUPO PHOENIX staff about the significance of implementing and developing an Information Security and Business Continuity Management System.
The organization will constantly seek opportunities for improvement in the field of information security and business continuity. To achieve this, the following actions will be undertaken:
-
Periodic risk assessments: Conduct regular risk assessments to identify new threats and vulnerabilities, and implement measures to mitigate identified risks.
-
Updating policies and procedures: Regularly review information security policies and procedures to ensure they remain relevant and effective. Implement necessary improvements to strengthen information protection.
- Monitoring and incident detection: Establish an information security incident monitoring and detection system to identify and respond promptly to potential security breaches.
-
Training and awareness: Provide regular training to employees on information security-related topics, including best practices, policies, and procedures. Promote awareness of the importance of information security throughout the organization.
-
Review and audit: Conduct regular reviews and audits of information security controls to ensure their effectiveness and compliance. Take corrective action in case of deviations or non-compliance.
-
Technological improvements: Consider and adopt new information security technologies and solutions that can enhance the protection of information assets.
Management establishes and reviews objectives and goals, having the defined policy as a framework of reference, setting responsibilities for its achievement and establishing performance criteria.
The management is committed to the implementation, maintenance and improvement of the Information Security and Business Continuity System, providing it with those means and resources that are necessary and urging all personnel to assume this commitment.