{"id":2574,"date":"2025-04-23T11:15:18","date_gmt":"2025-04-23T11:15:18","guid":{"rendered":"https:\/\/cypcore.com\/?page_id=2574"},"modified":"2025-09-30T13:29:13","modified_gmt":"2025-09-30T13:29:13","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/cypcore.lamagnetica.net\/en\/information-security-policy\/","title":{"rendered":"INFORMATION SECURITY POLICY"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2574\" class=\"elementor elementor-2574\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2f5c6c e-flex e-con-boxed e-con e-parent\" data-id=\"f2f5c6c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e265077 e-flex e-con-boxed e-con e-parent\" data-id=\"e265077\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45ca661 elementor-widget elementor-widget-text-editor\" data-id=\"45ca661\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>INFORMATION SECURITY POLICY<\/h1>\n\nThe purpose of this information security policy is to protect the information assets of CONTENEDORES Y PROCESOS, S.L.U., (hereinafter CYP).\ninformation assets of CONTENEDORES Y PROCESOS, S.L.U., (hereinafter CYP), in particular, the information systems that support the\ninformation systems that support the development of engineering projects in the area of logistics and industrial processes for the automotive sector.\nlogistics and industrial processes for the automotive sector. This policy is aligned with CYP's\nstrategic direction of CYP and seeks to support the company's business objectives by means of\nthe appropriate management of information security.\n\nCYP is committed to:\n\n- Establish, implement, maintain and continually improve an information security management system.\nsecurity management system.\n\n- Protect information against loss of availability, confidentiality and integrity.\n\n- Systematically and regularly assess and manage information security risks, implementing appropriate controls to mitigate identified risks.\nimplementing adequate controls to mitigate identified risks.\n\n- Comply with applicable legal requirements, requirements applicable to the security of information and information systems, the requirements applicable to the security of information and information systems, and the\nand information systems, customer expectations and contractual commitments, with regard to the protection of information security.\ncontractual commitments regarding the protection of sensitive information.\n\n- Ensure that this policy is communicated to all CYP personnel and other interested parties.\nstakeholders.\n\n- Periodically review this policy to ensure its continuing appropriateness and effectiveness.\n\n- Implement a continual improvement process to evaluate and adjust the security policy and controls in response to changes in the\nin response to changes in the business environment, technological advances and lessons learned from security incidents.\nlessons learned from security incidents.\n\n- Foster a culture of information security throughout the organisation.\n\n- Provide ongoing training and awareness to all employees on information security best practices and their individual responsibilities.\nsecurity practices and their individual responsibilities in protecting the company's information assets.\nprotection of the company's information assets.\n\n- Establish procedures for identification, reporting, response and recovery from security incidents.\nsecurity incidents.\n\n- Implement and maintain a business continuity and disaster recovery plan that ensures the organisation's ability to continue to\nplan that ensures the organisation's ability to continue to operate and recover from disruptions that may affect the\ndisruptions that may affect the availability of services and information.\n\nEach employee is responsible for complying with this policy and its procedures as applicable to their job.\njob. Failure to do so may result in disciplinary action.\n\nThis policy has been approved by CYP management and will be reviewed annually or in the event of any significant changes to the\nsignificant change in the business environment or in legal or regulatory requirements.\n\n15 November 2024\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N El prop\u00f3sito de esta pol\u00edtica de seguridad de la informaci\u00f3n es proteger los activos de informaci\u00f3n de CONTENEDORES Y PROCESOS, S.L.U., (en adelante CYP) en particular, los sistemas de informaci\u00f3n que dan soporte al desarrollo de proyecto de ingenier\u00eda en el \u00e1rea de log\u00edstica y procesos industriales para el [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-2574","page","type-page","status-publish","hentry"],"title_linkedin":null,"photo_linkedin":null,"link_linkedin":null,"content_linkedln":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N - CYP Core<\/title>\n<meta name=\"description\" content=\"Pol\u00edtica de seguridad de la informaci\u00f3n de CYP: protecci\u00f3n de activos y sistemas en proyectos de ingenier\u00eda log\u00edstica para automoci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cypcore.lamagnetica.net\/en\/information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N - CYP Core\" \/>\n<meta property=\"og:description\" content=\"Pol\u00edtica de seguridad de la informaci\u00f3n de CYP: protecci\u00f3n de activos y sistemas en proyectos de ingenier\u00eda log\u00edstica para automoci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cypcore.lamagnetica.net\/en\/information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"CYP Core\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T13:29:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/\",\"url\":\"https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/\",\"name\":\"POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N - CYP Core\",\"isPartOf\":{\"@id\":\"https:\/\/cypcore.lamagnetica.net\/#website\"},\"datePublished\":\"2025-04-23T11:15:18+00:00\",\"dateModified\":\"2025-09-30T13:29:13+00:00\",\"description\":\"Pol\u00edtica de seguridad de la informaci\u00f3n de CYP: protecci\u00f3n de activos y sistemas en proyectos de ingenier\u00eda log\u00edstica para automoci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/cypcore.lamagnetica.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cypcore.lamagnetica.net\/#website\",\"url\":\"https:\/\/cypcore.lamagnetica.net\/\",\"name\":\"CYP Core\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cypcore.lamagnetica.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"INFORMATION SECURITY POLICY - CYP Core","description":"CYP's information security policy: protection of assets and systems in automotive logistics engineering projects.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cypcore.lamagnetica.net\/en\/information-security-policy\/","og_locale":"en_GB","og_type":"article","og_title":"POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N - CYP Core","og_description":"Pol\u00edtica de seguridad de la informaci\u00f3n de CYP: protecci\u00f3n de activos y sistemas en proyectos de ingenier\u00eda log\u00edstica para automoci\u00f3n.","og_url":"https:\/\/cypcore.lamagnetica.net\/en\/information-security-policy\/","og_site_name":"CYP Core","article_modified_time":"2025-09-30T13:29:13+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/","url":"https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/","name":"INFORMATION SECURITY POLICY - CYP Core","isPartOf":{"@id":"https:\/\/cypcore.lamagnetica.net\/#website"},"datePublished":"2025-04-23T11:15:18+00:00","dateModified":"2025-09-30T13:29:13+00:00","description":"CYP's information security policy: protection of assets and systems in automotive logistics engineering projects.","breadcrumb":{"@id":"https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cypcore.lamagnetica.net\/politica-de-seguridad-de-la-informacion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/cypcore.lamagnetica.net\/"},{"@type":"ListItem","position":2,"name":"POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N"}]},{"@type":"WebSite","@id":"https:\/\/cypcore.lamagnetica.net\/#website","url":"https:\/\/cypcore.lamagnetica.net\/","name":"CYP Core","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cypcore.lamagnetica.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/cypcore.lamagnetica.net\/en\/wp-json\/wp\/v2\/pages\/2574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cypcore.lamagnetica.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cypcore.lamagnetica.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cypcore.lamagnetica.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cypcore.lamagnetica.net\/en\/wp-json\/wp\/v2\/comments?post=2574"}],"version-history":[{"count":13,"href":"https:\/\/cypcore.lamagnetica.net\/en\/wp-json\/wp\/v2\/pages\/2574\/revisions"}],"predecessor-version":[{"id":3913,"href":"https:\/\/cypcore.lamagnetica.net\/en\/wp-json\/wp\/v2\/pages\/2574\/revisions\/3913"}],"wp:attachment":[{"href":"https:\/\/cypcore.lamagnetica.net\/en\/wp-json\/wp\/v2\/media?parent=2574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}