At IO – IMMERSIVE OASIS, we have established a Quality Management System in accordance with the guidelines of ISO 9001:2015, through which we commit to generating trust among our clients. To achieve this, we have based our approach on criteria of loyalty, satisfaction, and continuous improvement.
To fulfill this policy, at IO – IMMERSIVE OASIS, we set and commit to the following guidelines
The assurance of compliance with these guidelines, along with our commitment to continuous improvement, ensures the fulfillment of our primary commitment:
CUSTOMER SATISFACTION.
Regarding INFORMATION SECURITY:
IO – IMMERSIVE OASIS bases its activities on the processing of different types of data and information, which allows it to execute its business processes. The systems, programs, communication infrastructures, files, databases, archives, etc., constitute the main assets of IO – IMMERSIVE OASIS, such that damage or loss of these assets impacts the execution of its operations and may endanger the continuity of the organization..
As priority objectives, it should be:
Guarantee an efficient service to our clients, with a high level of quality and security, preserving their rights and their trust.
Protect the intellectual capital of the Organization to prevent its unauthorized disclosure or misuse.
To ensure this, the following Information Security Policy has been designed, with the following principles and objectives:
Information, both internal and that of our clients, has strategic value for the business and must be protected against unauthorized access and alterations, maintaining its confidentiality and integrity.
The source of the information must be reliable. The credibility of the information is determined by the authenticity of its source.
Information must be available, allowing authorized access whenever necessary.
The protection of information will be carried out through the application of control measures on the assets that store or process it: people, media, facilities, communications, systems, applications, etc. These measures must be proportional to the value of the asset being protected. The security controls applied will never exceed the cost of the assets they protect or the damage that could occur due to their absence.
Information security is not just an internal act, so formal commitment from suppliers and collaborators regarding information security management must be obtained.
Information security is everyone’s responsibility. Every user is obligated to comply with the imposed requirements and to report any signs that may compromise it.
The continuity of critical business operations must be ensured.
Security requirements and their compliance must be periodically reviewed and verified.
The processing of information and the security measures applied must always be aligned with applicable laws, regulations, and standards.
To fulfill these principles and objectives of information security, the following must be done:
Define responsibilities in information security by generating the corresponding organizational structure.
Establish a system for classifying information and data to protect critical information assets.
Develop a set of rules, standards, and/or procedures applicable to management, employees, partners, external service providers, organizational assets, and operations on them, etc.
Specify the consequences of non-compliance with the Security Policy in the workplace.
Protect assets through controls/measures against threats that could lead to security incidents.
Observe legislation regarding data protection, intellectual property, labor, information society services, criminal law, etc., that affects the Organization’s assets.
Gijón, September 1, 2024
Gabriel Cerra – CEO of IO – IMMERSIVE OASIS.