Information Security Policy (WEB)

Templus Data Centers

TEMPLUS has chosen to manage its information systems following best practices, in accordance with the National Security Framework  (ENS). Recognizing the significant relevance of information systems, TEMPLUS establishes, under the direction of the company, the following fundamental principles of information security:

  • Principle of Regulatory Compliance: All information systems will comply with the applicable legal and sectoral regulations that impact information security. This especially includes provisions related to the protection of personal data, system security, data, communications and electronic services.
  • Risk Management Principle: The aim is to minimize risks to acceptable levels, maintaining a balance between security controls and the nature of the information. Security objectives must be established, reviewed and consistent with information security aspects.
  • Principle of Awareness and Training: Training and awareness programs will be implemented as well as educational campaigns for all users with access to information on issues related to data security.
  • Principles of Authenticity, Integrity, Availability and Traceability:
    • Guarantee the authenticity of the information, a characteristic consisting of an entity that is which it claims to be.
    • Ensure the integrity of the information, keeping it clear and precise, emphasizing the accuracy of the content and the processes involved.
    • Guarantee the availability of information, ensuring business continuity through contingency plans supported by information services.
    • Establish mechanisms that allow a proper tracking and recording of the actions taken with regards to information, facilitating the identification of events, changes in the system and of those who are responsible.
  • Principle of Responsibility: All members of TEMPLUS must take responsibility for their Conduct regarding information security, complying with established standards and controls.
  • Continuous Improvement Principle: Periodic reviews will be carried out on the effectiveness of the security controls implemented in the company to increase the ability to adapt to the constant evolution of both risks and the technological environment.
  • Incident Management Principle: An incident response plan shall be established to effectively address any security breaches and to minimize the impact of potential threats.

Thank you for signing up to our Newsletter

Te has registrado
en nuestra Newsletter