{"id":2061,"date":"2024-06-24T14:51:51","date_gmt":"2024-06-24T14:51:51","guid":{"rendered":"https:\/\/a9c183d5e768345cda3bae29c11d5d8a-141321498.eu-south-2.elb.amazonaws.com\/?page_id=2061"},"modified":"2024-06-24T15:45:48","modified_gmt":"2024-06-24T15:45:48","slug":"security-policy","status":"publish","type":"page","link":"https:\/\/www.finwave.es\/es\/security-policy\/","title":{"rendered":"Pol\u00edtica de seguridad"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2061\" class=\"elementor elementor-2061\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f55bc61 e-flex e-con-boxed e-con e-parent\" data-id=\"f55bc61\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5137346 elementor-widget elementor-widget-heading\" data-id=\"5137346\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Pol\u00edtica de seguridad<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f764243 elementor-widget elementor-widget-heading\" data-id=\"f764243\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTENT<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-628206e elementor-widget elementor-widget-text-editor\" data-id=\"628206e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<div class=\"page\" title=\"Page 1\"><div class=\"layoutArea\"><div class=\"column\"><div class=\"page\" title=\"Page 1\"><div class=\"layoutArea\"><div class=\"column\"><p>1. INTRODUCTION<\/p><p>2. Regulatory Framework<\/p><p>3. Scope<\/p><p>\u00a0 \u00a03.1 Mission and objectives<\/p><p>\u00a0 \u00a03.2 Prevention<\/p><p>\u00a0 \u00a03.3 Detection<\/p><p>\u00a0 \u00a03.4 Answer<\/p><p>\u00a0 \u00a03.5 Recovery<\/p><p>4. Security organization<\/p><p>\u00a0 \u00a04.2 Security Manager<\/p><p>\u00a0 \u00a04.3 Systems Manager<\/p><p>\u00a0 \u00a04.4 Responsible for Information<\/p><p>\u00a0 \u00a04.5 Responsible for the Development of the service<\/p><p>\u00a0 \u00a04.6 Designation Procedures<\/p><p>\u00a0 \u00a04.7 Dissemination, updating and revision of the information security policy<\/p><p>5. Personal data<\/p><p>6. Risk management<\/p><p>7. Staff obligations<\/p><p>8. Thirds<\/p><p>9. Approval of the Document<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bcf593 elementor-widget elementor-widget-heading\" data-id=\"9bcf593\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. INTRODUCTION<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0ed431 elementor-widget elementor-widget-text-editor\" data-id=\"c0ed431\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 1\"><div class=\"layoutArea\"><div class=\"column\"><div class=\"page\" title=\"Page 1\"><div class=\"layoutArea\"><div class=\"column\"><p>TALENTO MOBILE is a global technology company. We are defined by our innovative spirit, our<br \/>desire to do things well done and our experience in digital projects and solutions.<br \/>Although we have already exceded 5 years of life, we like to live each day as if it were the first<br \/>This makes us feel freer, enhances innovation and the flow of ideas and most importantly,<br \/>ensures that our team is as comfortable as posible, which is directly proportional to the<br \/>results that clients get from our developments and projects.<\/p><p>The values that describe TALENTO MOBILE are the following:<\/p><ul><li>Simplicity: We make it simple and effective<\/li><li>Agility: We use agile methodologies while maintaining quality<\/li><li>Inspiration: We care about the value of details<\/li><li>Motivation: We are passionate about our work and it shows<\/li><\/ul><p>Our solutions apply to the Fintech and Insurtech industry:<\/p><ul><li>ID Verification: Intelligent and automated identity verification (OCR) tool. Remotely<br \/>extract and validate information from personal identification documents for opening<br \/>accounts or registering as a new customer.<\/li><li>Liveness &amp; Facial Biometrics: Software for validating users remotely, comparing<br \/>biometric features in video and photographs to avoid identity theft.<\/li><li>Digital Onboarding: Unified solution of ID Verification and Liveness &amp; Facial Biometrics<br \/>in a single product of easy integration into applications.<\/li><\/ul><p>Everything you need for the creation of remotely verified clients. The first low code digital onboarding platform on<br \/>the market.<\/p><ul><li>Clicquote (Chatbot): Our end-to-end Chatbot solution for product and service<br \/>contracting processes. You will be able to offer a unique user experience in any digital<br \/>channel Web, Mobile, WhatsApp in record time.<\/li><li>Perito Digital: Our computer vision solution for the detection of vehicles, claims and<br \/>license plates, which allow to accelerate and digitize the processes of expertise and<br \/>insurance contracting.<\/li><li>Videoanalytics: Video and real-time analysis for multiple biometric identification and<br \/>detection of objects such as masks or weapons, helping to create safer open spaces.<\/li><\/ul><p>Our services are adapted to the needs of each project with personalized services:<\/p><ul><li>UX\/UI Design (User Experience): User-centered design through quantitative and<br \/>qualitative research techniques, to offer solutions that really impact our users.<\/li><li>Custom Development (Development to Create Impact): We help our clients discover<br \/>and take advantage of technological innovations.<br \/>Providing experience in all phases of life of digital product or service development.<\/li><li>Digital Kit Program (Help for the digitization of SMEs and Self-employed): The<br \/>government of Spain launches the special program Acelera Pyme, with which Talento<br \/>Mobile collaborates as a provider of services and digital transformation.<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12ed106 elementor-widget elementor-widget-heading\" data-id=\"12ed106\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. REGULATORY FRAMEWORK<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e919b9 elementor-widget elementor-widget-text-editor\" data-id=\"1e919b9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 1\"><div class=\"layoutArea\"><div class=\"column\"><p>The regulatory framework on information security in which TALENTO MOBILE carries out its activity, essentially, is the following:<\/p><p>\u2022 Royal decree 3\/2010, of 8 January, by which regulates the National Scheme of Security in the field of the Electronic Administration.<\/p><p>\u2022 Royal decree 951\/2015, of 23 October, of modification of the Royal decree 3\/2010, of 8 January, by which regulates the National Scheme of Security in the field of the Electronic Administration.<\/p><p>\u2022 CCN-STIC 821 Safety Guide: Safety Standards. \u2022 CCN-STIC 804 Security Guide: Implementation Guide.<\/p><p>\u2022 GDPR (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons regarding the processing of personal data and on the free movement of such data.<\/p><p>\u2022 Organic Law 3\/2018, of December 5, protection of Personal Data and guarantee of digital rights.<\/p><p>\u2022 UNE ISO\/IEC 27001:2014 Information security management systems. Requirements<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30ff744 elementor-widget elementor-widget-heading\" data-id=\"30ff744\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. SCOPE<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52d3113 elementor-widget elementor-widget-text-editor\" data-id=\"52d3113\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 1\"><div class=\"layoutArea\"><div class=\"column\"><p>The scope of this policy is defined as follows:<br \/><strong>Information security management system used in:<\/strong><br \/><strong>Development, Maintenance, and Implementation of Computer Services in mobile and web<\/strong><br \/><strong>applications. For large and small businesses<\/strong><\/p><p><br \/>TALENTO MOBILE relies on its ICT systems to achieve its objectives. These systems must be<br \/>managed diligently, taking appropriate measures to protect them against accidental or<br \/>deliberate damage that may affect the availability, integrity, confidentiality, authenticity or<br \/>traceability of the information processed, or of the services provided.<\/p><p>The objective of information security is to guarantee the quality of information and the<br \/>continuous provision of services, acting preventively, supervising daily activity and reacting<br \/>promptly to incidents.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7a47ec elementor-widget elementor-widget-heading\" data-id=\"f7a47ec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3.1 Mission and objetives<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9111eb1 elementor-widget elementor-widget-text-editor\" data-id=\"9111eb1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>At least the following objectives shall be developed:<\/p><p>a) Use of corporate ICT resources, such as e-mail, Internet access, computer and communications equipment.<\/p><p>b) Management of information assets inventoried, categorized and associated with a manager.<\/p><p>c) Necessary mechanisms so that any person who accesses, or can access the information assets, knows their responsibilities and thus reduces the risk derived from an improper use of said assets.<\/p><p>d) Physical security, so that information assets will be placed in secure areas, protected by physical access controls appropriate to their level of criticality. The information systems and assets contained in such areas shall be sufficiently protected from physical or environmental threats.<\/p><p>e) Security in the management of communications and operations, so that the information transmitted through communications networks must be adequately protected, taking into account its level of sensitivity and criticality, through mechanisms that guarantee its security.<\/p><p>f) Access control, limiting access to information assets by users, processes and information systems through the implementation of identification, authentication and authorization mechanisms according to the criticality of each asset.<\/p><p>g) Acquisition, development and maintenance of information systems, taking into account the aspects of information security in all phases of the life cycle of these systems.<\/p><p>h) Management of security incidents by implementing appropriate mechanisms for the correct identification, recording and resolution of security incidents.<\/p><p>i) Continuity management by implementing appropriate mechanisms to ensure the availability of information systems and maintaining the continuity of their business processes.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b74f204 elementor-widget elementor-widget-heading\" data-id=\"b74f204\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3.2 Prevention<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e32682f elementor-widget elementor-widget-text-editor\" data-id=\"e32682f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 2\"><div class=\"layoutArea\"><div class=\"column\"><p>To defend against threats, departments must apply minimum security measures, as well as<br \/>ensure that ICT security is an integral part of every stage of the system lifecycle.<br \/>Security requirements and funding needs should be identified and included in planning, bids,<br \/>and tender specifications for ICT projects. Departments must be prepared to prevent, detect,<br \/>react and recover from incidents.<br \/>To ensure compliance with the policy, departments must:<\/p><p>\u2022 Authorize systems before entering into operation.<br \/>\u2022 Request periodic review by third parties in order to obtain an independent<br \/>evaluation.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22ca05a elementor-widget elementor-widget-heading\" data-id=\"22ca05a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3.3 Detection<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-872333e elementor-widget elementor-widget-text-editor\" data-id=\"872333e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 2\"><div class=\"layoutArea\"><div class=\"column\"><p>Since services can be rapidly degraded due to incidents, ranging from a simple slowdown to their arrest, services must monitor the operation on an ongoing basis to detect anomalies in the provision of services and act accordingly. Detection, analysis and reporting mechanisms will be established that reach those responsible regularly and when there is a significant deviation from the parameters that have been pre-established as normal.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c4a882 elementor-widget elementor-widget-heading\" data-id=\"6c4a882\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3.4 Answer<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75d05e7 elementor-widget elementor-widget-text-editor\" data-id=\"75d05e7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>TALENTO MOBILE and its departments must:<br \/>\u2022 Establish mechanisms to respond effectively to security incidents.<br \/>\u2022 Designate a point of contact for communications regarding incidents detected in<br \/>other departments or in other agencies.<br \/>\u2022 Establish protocols for the exchange of information related to the incident.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94ff226 elementor-widget elementor-widget-heading\" data-id=\"94ff226\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3.5 Recovery<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07d3c6b elementor-widget elementor-widget-text-editor\" data-id=\"07d3c6b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>To ensure the availability of critical services, departments should develop ICT systems continuity plans as part of their overall business continuity and recovery activities plan.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c3da03 elementor-widget elementor-widget-heading\" data-id=\"9c3da03\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. SECURITY ORGANIZATION<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4831485 elementor-widget elementor-widget-text-editor\" data-id=\"4831485\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>The implementation of the Security Policy in TALENTO MOBILE requires that all members of the organization understand their obligations and responsibilities depending on the position held. As part of the Information Security Policy, the main roles are identified and detailed as follows:<\/p><p>\u2022 Head of Security: C\u00e9sar Castillo<\/p><p>\u2022 Responsible for Information: Karla<\/p><p>\u2022 Head of Service: C\u00e9sar Castillo<\/p><p>\u2022 Systems Manager: Javier Rom\u00e1n<\/p><p>\u2022 DPO: Datages Consulting<\/p><p>The following sections specify the roles assigned to each of these roles<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ea4e4d elementor-widget elementor-widget-heading\" data-id=\"0ea4e4d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4.1 Committees: Roles and responsabilities<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81a1dec elementor-widget elementor-widget-text-editor\" data-id=\"81a1dec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>Information Security is an organizational responsibility that is shared with the management of TALENTO MOBILE. Accordingly, it promotes the composition of an Information Security Committee, in order to establish a defined path and support security initiatives.<br \/>This Committee is composed of each of the above-mentioned figures and a chairman who will be ultimately responsible for the decisions taken and who will direct the meetings of the Security Committee, informing, proposing and coordinating the activities and decisions.<br \/>This role of president initially falls to the head of Security.<\/p><p><br \/>The functions of the Information Security Committee are as follows:<\/p><p>\u2022 Review of the Information Security Policy and the main responsibilities and proposal for approval to senior management.<\/p><p>\u2022 Define and promote the strategy and planning of information security by proposing the allocation of budget and precise resources.<\/p><p>\u2022 Supervision and control of significant changes in the exposure of information assets to the main threats, as well as the development and implementation of controls and measures aimed at ensuring the security of such assets.<\/p><p>\u2022 Approval of the main initiatives to improve Information Security.<\/p><p>\u2022 Supervision and monitoring of aspects such as:<\/p><p>\u2022 Main incidents in Information Security. \u2022 Preparation and updating of continuity plans. \u2022 Compliance and dissemination of Security Policies.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2196169 elementor-widget elementor-widget-heading\" data-id=\"2196169\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4.2 Security Manager<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d4288e elementor-widget elementor-widget-text-editor\" data-id=\"8d4288e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>It is responsible for the definition, coordination and verification of compliance with the information security requirements defined in the strategic objectives.<\/p><p><br \/>The functions of the Information Security Officer are as follows:<br \/>\u2022 Assistance to the Chairman of the Security Committee in drawing up the<br \/>agenda for the meetings to be held.<br \/>\u2022 Coordinate and control the information security and data protection measures of TALENTO MOBILE.<br \/>\u2022 Supervise the implementation, maintain, control and verify compliance with:<br \/>\u2022 The information security strategy defined by the Security Committee.<br \/>\u2022 The rules and procedures contained in the Information Security Policy of TALENTO MOBILE and implementing regulations.<br \/>\u2022 Supervise the security incidents produced in TALENTO MOBILE.<br \/>\u2022 Disseminate in TALENTO MOBILE the rules and procedures contained in the Information Security Policy and development regulations, as well as the functions and obligations in terms of information security.<br \/>\u2022 Supervise and collaborate in the internal or external audits necessary to verify the degree of compliance with the Security Policy, development regulations and applicable laws on the protection of personal data and information<br \/>security.<br \/>\u2022 Advise on information security matters to the different operational areas of TALENTO MOBILE.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12f041b elementor-widget elementor-widget-heading\" data-id=\"12f041b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4.3 Systems Manager<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9585c01 elementor-widget elementor-widget-text-editor\" data-id=\"9585c01\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>It is responsible for ensuring the execution of measures to protect the assets and services of the information systems that support the activity of TALENTO MOBILE.<br \/>The functions of the Systems Manager are as follows:<\/p><p>\u2022 Develop, operate and maintain the Information System during the life cycle, specifications, installation and verification of its correct operation.<br \/>\u2022 Define the topology and management system of the Information System establishing the criteria of use and the services available in it.<br \/>\u2022 Ensure that specific security measures are properly integrated within the overall<br \/>security framework.<br \/>\u2022 Select and establish the functions and obligations to the IT Technical Managers in charge of personifying a security management of the assets of TALENTO MOBILE in accordance with the defined security strategy.<br \/>\u2022 Guarantee that the implementation of new systems and changes in existing ones complies with the security requirements established in TALENTO MOBILE.<br \/>\u2022 Establish the processes and controls for monitoring the state of security that allow detecting the incidents produced and coordinating their investigation and resolution.<br \/>\u2022 The person responsible for the System may agree to suspend the handling of certain information or the provision of a certain service if it is informed of serious security deficiencies that could affect the satisfaction of the established requirements.<br \/>\u2022 This decision must be agreed with those responsible for the affected information, the affected service and the person responsible for Security, before being executed.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e69cf65 elementor-widget elementor-widget-heading\" data-id=\"e69cf65\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4.4 Responsible for information<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df369bb elementor-widget elementor-widget-text-editor\" data-id=\"df369bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>It is responsible for ensuring the execution of measures for the protection of information, own or of the clients, that are used in the activity of TALENTO MOBILE.<br \/><br \/><\/p><p>The functions of the Data Controller are as follows:<br \/>\u2022 It establishes the security requirements for the information managed. If this information includes personal data, the requirements arising from data protection legislation must also be considered.<br \/>\u2022 Determines information security levels.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f65843 elementor-widget elementor-widget-heading\" data-id=\"6f65843\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4.5 Responsible for the Development of the service<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b450441 elementor-widget elementor-widget-text-editor\" data-id=\"b450441\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>He is responsible for ensuring the use of security measures in the services and projects developed by the TALENTO MOBILE teams.<br \/>The functions of the person responsible for the development of the service are the following:<br \/>\u2022 Has the power to establish the security requirements of the services provided related to development<br \/>\u2022 Describes Development requirements<br \/>\u2022 Ensures compliance with THE development methodologies of TALENTO MOBILE, as well as the product safety requirements<br \/>\u2022 Determines the security levels of the service.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8270f51 elementor-widget elementor-widget-heading\" data-id=\"8270f51\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4.6 Designation Procedures<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0aaf856 elementor-widget elementor-widget-text-editor\" data-id=\"0aaf856\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>The person responsible for Information Security will be appointed by the Governing Body on the proposal of the ICT Security Committee. The appointment will be reviewed every 2 years or when the post becomes vacant.<br \/>The Department responsible for a service that is provided electronically in accordance with Law 11\/2007 will designate the person responsible for the System, specifying their functions and responsibilities within the framework established by this Policy.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3801ba4 elementor-widget elementor-widget-heading\" data-id=\"3801ba4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4.7 Dissemination, updating and revision of the information security policy<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40a4492 elementor-widget elementor-widget-text-editor\" data-id=\"40a4492\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>The mission of the ICT Security Committee will be the annual review of this Information<br \/>Security Policy and the proposal for its revision or maintenance.<br \/>The Policy will be approved by the Governing Body and will be disseminated so that all affected parties are aware of it.<br \/>This Policy will be developed through safety regulations that address specific aspects.<br \/>The security regulations shall be available to all members of the organization who need to know them, in particular those who use, operate or manage the information and communications systems.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29e21bd elementor-widget elementor-widget-heading\" data-id=\"29e21bd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5. PERSONAL DATA<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f8bd5d elementor-widget elementor-widget-text-editor\" data-id=\"1f8bd5d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>The Data Protection Policy and the Manual of Security Measures to which only authorized persons will have access, identify those responsible for the processing of personal data, detail these treatments and expose the corresponding security measures. All the information systems of TALENTO MOBILE will comply with the security levels required by the regulations for the nature and purpose of the personal data collected in the Security Document. In application of the principle of proactive responsibility established in the General Data Protection Regulation (GDPR), and the new LOPD, the activities of processing personal data will be integrated into the categorization of systems of the National Security Scheme, considering the threats and risks associated with this type of treatment. Any other regulations in force on the protection of personal data will also apply.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad0630c elementor-widget elementor-widget-heading\" data-id=\"ad0630c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6. RISK MANAGEMENT<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-023c08a elementor-widget elementor-widget-text-editor\" data-id=\"023c08a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>All systems subject to this Policy shall perform a risk analysis, assessing the threats and risks to<br \/>which they are exposed.<br \/>This analysis will be repeated:<br \/>\u2022 Regularly, at least once a year<br \/>\u2022 When the information handled changes<br \/>\u2022 When the services provided change<br \/>\u2022 When a serious security incident occurs<br \/>\u2022 When serious vulnerabilities are reported<\/p><p>For the harmonization of risk analyses, the Safety Committee shall establish a baseline assessment for the different types of information handled and the different services provided. The ICT Security Committee will boost the availability of resources to meet the security needs of the different systems, promoting horizontal investments. Risk management will be documented in the Risk Analysis and Management report.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1264bc1 elementor-widget elementor-widget-heading\" data-id=\"1264bc1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7. STAFF OBLIGATIONS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ccd1d3 elementor-widget elementor-widget-text-editor\" data-id=\"0ccd1d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>All members of TALENTO MOBILE have the obligation to know and comply with this Information Security Policy and the Security Regulations, being the responsibility of the Security Committee to provide the necessary means for the information to reach those affected. All MEMBERS OF TALENTO MOBILE will attend a security awareness session at least once a year. A continuous awareness program will be established to serve all members of TALENTO MOBILE, in particular those of new incorporation. Persons with responsibility for the use, operation or administration of ICT systems will receive training for the safe operation of the systems to the extent that they need it to perform their work. Training will be mandatory before assuming a responsibility, whether it is your first assignment or if it is a change of job or responsibilities in it. Failure to comply with this Information Security Policy may lead to the initiation of the appropriate disciplinary measures, without prejudice to the corresponding legal responsibilities.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-263ae5f elementor-widget elementor-widget-heading\" data-id=\"263ae5f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">8. THIRDS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a356de0 elementor-widget elementor-widget-text-editor\" data-id=\"a356de0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p>When TALENTO MOBILE uses third-party services or transfers information to third parties, they will be made participants in this Security Policy and the Security Regulations that concern said services or information. This third party will be subject to the obligations established in said regulations, being able to develop its own operating procedures to satisfy it. Specific procedures for reporting and resolving incidents will be established. It will be ensured that third-party personnel are adequately security-conscious, at least at the same level as that set out in this Policy.<\/p><p>When any aspect of the Policy cannot be satisfied by a third party as required in the previous paragraphs, a report from the Security Officer will be required specifying the risks incurred and how to treat them. Approval of this report by those responsible for the information and services concerned will be required before proceeding forward.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4cf7cd elementor-widget elementor-widget-heading\" data-id=\"b4cf7cd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">9. APPROVAL OF THE DOCUMENT<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de909f5 elementor-widget elementor-widget-text-editor\" data-id=\"de909f5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div title=\"Page 3\"><div><div><p>Document: Security Policy\u00a0<\/p><p>Signed: Status: Approved<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1394a8a elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"1394a8a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"468\" src=\"https:\/\/www.finwave.es\/wp-content\/uploads\/2024\/06\/Captura-de-Pantalla-2024-06-24-a-las-17.38.34-1024x468.png\" class=\"attachment-large size-large wp-image-2103\" alt=\"\" srcset=\"https:\/\/www.finwave.es\/wp-content\/uploads\/2024\/06\/Captura-de-Pantalla-2024-06-24-a-las-17.38.34-1024x468.png 1024w, https:\/\/www.finwave.es\/wp-content\/uploads\/2024\/06\/Captura-de-Pantalla-2024-06-24-a-las-17.38.34-300x137.png 300w, https:\/\/www.finwave.es\/wp-content\/uploads\/2024\/06\/Captura-de-Pantalla-2024-06-24-a-las-17.38.34-768x351.png 768w, https:\/\/www.finwave.es\/wp-content\/uploads\/2024\/06\/Captura-de-Pantalla-2024-06-24-a-las-17.38.34.png 1116w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-755f377 elementor-widget elementor-widget-heading\" data-id=\"755f377\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AUDIT TRAIL<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9ff5a2 elementor-widget elementor-widget-heading\" data-id=\"d9ff5a2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOCUMENT DETAILS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b32b8e elementor-widget elementor-widget-text-editor\" data-id=\"4b32b8e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p><strong>Title:<\/strong> English TM_Security Policy_v1.pdf<br \/><strong>File Name:<\/strong> English TM_Security Policy_v1.docx.pdf<br \/><strong>Document ID:<\/strong> 4256b819ffa34e25b9a764fe6e01bbf8<br \/><strong>Fingerprint:<\/strong> 124e6a4bb11c3bbd5dbeabcc6aba26ad<br \/><strong>Status:<\/strong> Completed<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a9448d elementor-widget elementor-widget-heading\" data-id=\"1a9448d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOCUMENT HISTORY<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1ed381 elementor-widget elementor-widget-text-editor\" data-id=\"f1ed381\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p><strong>Document Created:<\/strong><\/p><p>Document Created by Talento Mobile (administracion@talentomobile.com)<br \/>Fingerprint: 124e6a4bb11c3bbd5dbeabcc6aba26ad<\/p><p>Jun 29 2022 09:20AM UTC<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cdb125 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6cdb125\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 26-05-2024 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-block-end:0;flex-grow:1;border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider--element-align-start .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-start .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-start .elementor-divider__element{margin-inline-start:0}.elementor-widget-divider--element-align-end .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-end .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-end .elementor-divider__element{margin-inline-end:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24e8eb6 elementor-widget elementor-widget-text-editor\" data-id=\"24e8eb6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p><strong>Document Sent:<\/strong><\/p><p>Document Sent to Cesar Castillo (cesar.castillo@talentomobile.com)\u00a0<\/p><p>Jun 29 2022\u00a0<span style=\"font-style: inherit; font-weight: inherit; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\">09:20AM UTC<\/span><\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b28202a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b28202a\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8522c98 elementor-widget elementor-widget-text-editor\" data-id=\"8522c98\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p><strong>Document Viewed:<\/strong><\/p><p>Document Viewed by Cesar Castillo (cesar.castillo@talentomobile.com)<br \/>IP: 80.28.65.41<\/p><p>Jun 29 2022 02:59PM UTC<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d1cb6f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7d1cb6f\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64a54c5 elementor-widget elementor-widget-text-editor\" data-id=\"64a54c5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p><strong>Document Viewed:<\/strong><\/p><p>Document Viewed by Cesar Castillo (cesar.castillo@talentomobile.com) IP: 178.60.128.5<\/p><p>Jun 29 2022 02:59PM UTC<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25be789 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"25be789\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa087de elementor-widget elementor-widget-text-editor\" data-id=\"fa087de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p><strong>Document Signed:<\/strong><\/p><p>Document Signed by Cesar Castillo (cesar.castillo@talentomobile.com)<br \/>IP: 80.28.65.41<\/p><p><br \/>Jun 29 2022 03:00PM UTC<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-877ac6e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"877ac6e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69087d7 elementor-widget elementor-widget-text-editor\" data-id=\"69087d7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 3\"><div class=\"layoutArea\"><div class=\"column\"><p><strong>Document <\/strong><strong>Completed:<\/strong><\/p><p><br \/>This document has been completed.<br \/>Fingerprint: bfa435adcf169b8582ebc3cd5b798901<\/p><p><br \/>Jun 29 2022 03:01PM UTC<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Security Policy CONTENT 1. INTRODUCTION 2. Regulatory Framework 3. Scope \u00a0 \u00a03.1 Mission and objectives \u00a0 \u00a03.2 Prevention \u00a0 \u00a03.3 [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2061","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.finwave.es\/es\/wp-json\/wp\/v2\/pages\/2061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.finwave.es\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.finwave.es\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.finwave.es\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.finwave.es\/es\/wp-json\/wp\/v2\/comments?post=2061"}],"version-history":[{"count":28,"href":"https:\/\/www.finwave.es\/es\/wp-json\/wp\/v2\/pages\/2061\/revisions"}],"predecessor-version":[{"id":2109,"href":"https:\/\/www.finwave.es\/es\/wp-json\/wp\/v2\/pages\/2061\/revisions\/2109"}],"wp:attachment":[{"href":"https:\/\/www.finwave.es\/es\/wp-json\/wp\/v2\/media?parent=2061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}