Information Security Policy
The Policy that underpins the Information Security Management Systems (ISMS – ISO 27001) of INTERNET TECHNOLOGY PARTNER (Intech Partner) includes the commitment to meet the requirements for continually improving the effectiveness of the management system, protecting the information supported by Information Technologies, and providing a framework to establish and review ISMS objectives. It also includes the commitment to comply with applicable legal requirements, to communicate this policy within the organization and to interested parties, and to review it regularly to ensure its ongoing suitability.
Mission & Vision
Within the Intechpartner team we have extensive experience delivering complex projects for major clients in sectors such as finance, energy, insurance, telecommunications, tourism, e‑commerce, public administration, and more. We bring this accumulated experience into each of our projects, maximizing the chances of success and ensuring that the agreed objectives are achieved.
Talent is our differentiating value. It is embedded in our DNA and is reflected in the solutions we deliver across all our projects, enabling our clients to stand out from their competitors and to build barriers to entry in high‑growth markets. We are proud of our ability to attract talent and to incorporate into our team both young professionals with outstanding academic records and senior experts with extensive experience.
In general terms, our objective is to: Implement a set of measures aimed at minimizing cyber risks, both in the solutions we develop and in our own activities, and at reducing our exposure surface.
To achieve these objectives, systems are managed diligently, and appropriate measures are taken to protect them against accidental or deliberate damage that could affect the availability, authenticity, integrity, confidentiality, or traceability of the information processed, or of the services provided.
The purpose of information security is to guarantee the quality of information and the continuous delivery of services, acting preventively, monitoring daily activity, and responding swiftly to incidents.
ISMS Policy
Management is committed to providing products and services that consistently meet the needs and expectations of our clients. All staff are involved in complying with this Information Security Management (ISMS) policy, which is an integral and essential part of the way our organization is managed. To ensure the highest level of quality and security in our processes and services, we make sure that they are carried out effectively through our procedures, which describe our processes. The adoption of the ISMS is intended to ensure compliance with the following commitments:
- Comply with the requirements set out in the ISO 27001 standard (Information Security Management System).
- Comply with applicable legal, regulatory, statutory, client, and other requirements affecting us, ensuring information security; this includes the requirements of the European Directive 2022/2555 (NIS2).
- Continually improve the effectiveness of the ISO 27001 system, raise awareness of information security and continuous improvement, encourage the participation of all company personnel, and continually enhance the measures in place to guarantee information security based on the ISMS.
- Base our ongoing pursuit of excellence on the early identification and elimination of error sources. Prevention always takes priority over correction.
- Achieve the motivation, skills, qualifications, and experience of our human resources through appropriate selection, training, and coaching activities.
- Establish and maintain permanent channels of communication and information with our clients, staff, suppliers, and society at large.
- Make the Information Security Policy (ISMS) available to the public and to interested parties for their information and awareness.
- Ensure that the purpose of this Information Security Policy is to protect the information assets of INTERNET TECHNOLOGY PARTNER and of our clients.
- Ensure that the objective of this Information Security Policy is to work in a secure and controlled environment; this fundamental objective is the reference framework for all the activities and services we provide.
- Management is committed to complying with the applicable information security requirements and to providing the resources needed to meet them.
- Management is committed to complying with the applicable information security requirements and to providing the resources needed to meet them.
Likewise:
- Information is protected against loss of Availability, Confidentiality, Authenticity, Integrity, and Traceability.
- Information is protected against unauthorized access.
- Business requirements regarding information security and information systems are fulfilled.
- Security incidents are reported and handled appropriately.
Management provides the Information Security Management System with all the necessary tools, both documentary and technological, to ensure that the Information Security Policy (ISMS) is understood, implemented, applied, and kept up to date at all levels of the organization.