{"id":12313,"date":"2023-11-22T11:05:58","date_gmt":"2023-11-22T10:05:58","guid":{"rendered":"https:\/\/www.travelcompositor.com\/?page_id=12313"},"modified":"2025-11-17T16:05:33","modified_gmt":"2025-11-17T15:05:33","slug":"corporate-information-security-policy","status":"publish","type":"page","link":"https:\/\/travelcompositor.com\/es\/corporate-information-security-policy\/","title":{"rendered":"Pol\u00edtica corporativa de seguridad de la informaci\u00f3n"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"12313\" class=\"elementor elementor-12313\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d0f3e53 e-flex e-con-boxed e-con e-parent\" data-id=\"1d0f3e53\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-423322b7 elementor-widget elementor-widget-text-editor\" data-id=\"423322b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<h1 class=\"wp-block-heading\">POLITICA DE SEGURIDAD DE LA INFORMACI\u00d3N<\/h1>\n\n<h2>Sistema de Gesti\u00f3n de la Seguridad de la Informaci\u00f3n<\/h2>\n\n<h3>Pol\u00edtica revisada anualmente<\/h3>\n\n<p>\u00a0<\/p>\n\n<h3>OBJETIVO<\/h3>\n\n<p>The purpose of this Information Security Policy, part of the Information Security Management System (ISMS), is to define Travel Compositor\u2019s security management guidelines. These guidelines ensure that access, use and protection of all information assets are carried out in accordance with business requirements, while guaranteeing integrity, availability, and confidentiality of information.<br \/>Travel Compositor commits to complying with applicable legislation, internal security rules, and established procedures.<\/p>\n\n<p>\u00a0<\/p>\n\n<h3>\u00c1MBITO DE APLICACI\u00d3N<\/h3>\n\n<p>This policy applies to all individuals \u2014 internal or external \u2014 who access Travel Compositor\u2019s information assets within the ISMS scope.<br \/>The protection requirements cover all information stored or processed in any format (digital or paper) as well as related information systems owned or managed by Travel Compositor.<br \/>Details of the ISMS scope are defined in the internal Context Document.<\/p>\n\n<p>\u00a0<\/p>\n\n<h3>PRINCIPIOS<\/h3>\n\n<p>This policy is based on the following core security and privacy principles:<\/p>\n<p>\u2022 Effectiveness: Information must be relevant and useful for business operations.<br \/>\u2022 Efficiency: Information must be processed using optimal human and material resources.<br \/>\u2022 Integrity: Information must be complete, consistent, and protected against unauthorized alterations.<br \/>\u2022 Accuracy: Information must be free of errors or irregularities.<br \/>\u2022 Availability: Information and processing systems must remain accessible when needed to ensure service continuity.<br \/>\u2022 Legality: All information handling activities must comply with applicable legal regulations.<br \/>\u2022 Confidentiality: Information must be protected from unauthorized access, use, or disclosure.<br \/>\u2022 Privacy: Personal data must be collected, processed, stored, shared, and disposed of securely.<br \/>\u2022 Authorization: Access must be granted based on defined authorization levels.<br \/>\u2022 Physical Protection: All information-processing equipment must be safeguarded against unauthorized physical access.<br \/>\u2022 Accountability: All stakeholders are responsible for protecting information systems and applying security best practices.<\/p>\n<p>\u00a0<\/p>\n\n<h3>OBJETIVOS DEL SGSI<\/h3>\n\n<p>\u2022 Maintain and continually improve Information Security and Privacy across the organization.<br data-start=\"2708\" data-end=\"2711\" \/>\u2022 Ensure that all personnel contribute to the protection of information assets.<br data-start=\"2790\" data-end=\"2793\" \/>\u2022 Establish a management framework aligned with <strong data-start=\"2841\" data-end=\"2854\">ISO 27001<\/strong>, using <strong data-start=\"2862\" data-end=\"2875\">ISO 27002<\/strong> as a set of best practices.<br data-start=\"2903\" data-end=\"2906\" \/>\u2022 Guarantee compliance with data protection legislation, especially for personal and sensitive data.<br data-start=\"3006\" data-end=\"3009\" \/>\u2022 Protect Travel Compositor\u2019s information against internal and external threats (intentional or accidental) to ensure service continuity.<\/p>\n\n<h4>\u00a0<\/h4>\n<h3>POL\u00cdTICAS NORMAS Y PROCEDIMIENTOS<\/h3>\n\n<p>All Travel Compositor employees and collaborators are required to comply with this policy, as well as all related security standards, processes and documented procedures.<br data-start=\"3369\" data-end=\"3372\" \/>Security awareness and proactive protection are integral responsibilities of every team member.<\/p>\n\n<h3>\u00a0<\/h3>\n<h3>ROLES AND RESPONSIBILITIES<\/h3>\n\n<p>Travel Compositor defines and documents security roles and responsibilities in the internal <strong data-start=\"3604\" data-end=\"3659\">Roles and Responsibilities for Information Security<\/strong> document.<br data-start=\"3669\" data-end=\"3672\" \/>An <strong data-start=\"3675\" data-end=\"3709\">Information Security Committee<\/strong> acts as the highest authority, defining objectives, strategies and overseeing compliance.<\/p>\n\n<h3>\u00a0<\/h3>\n<h3>GESTI\u00d3N DE LOS RIESGOS<\/h3>\n\n<p data-start=\"3833\" data-end=\"4149\">All information assets within the ISMS scope are subject to risk analysis to identify threats, vulnerabilities and impacts.<br data-start=\"3956\" data-end=\"3959\" \/>Risk assessment must be conducted:<br data-start=\"3993\" data-end=\"3996\" \/>\u2022 At least annually<br data-start=\"4015\" data-end=\"4018\" \/>\u2022 After significant changes in services or information<br data-start=\"4072\" data-end=\"4075\" \/>\u2022 Following major security incidents or newly discovered vulnerabilities<\/p>\n<p data-start=\"4151\" data-end=\"4341\">The Security Manager leads the risk analysis process and reports findings to the Information Security Committee, which ensures necessary resources and selects proportional security measures.<\/p>\n\n<h3>\u00a0<\/h3>\n<h3>MEJORA CONTINUA<\/h3>\n\n<p data-start=\"4382\" data-end=\"4580\">Information security management is a continuous and evolving process. Improvements may arise due to changes in business, technology, legal requirements, or newly identified risks. Actions include:<\/p>\n<p data-start=\"4582\" data-end=\"4847\">a) Reviewing the Information Security Policy<br data-start=\"4626\" data-end=\"4629\" \/>b) Reviewing services, processes and information categorization<br data-start=\"4692\" data-end=\"4695\" \/>c) Conducting annual risk analyses<br data-start=\"4729\" data-end=\"4732\" \/>d) Performing internal and external audits<br data-start=\"4774\" data-end=\"4777\" \/>e) Updating security measures<br data-start=\"4806\" data-end=\"4809\" \/>f) Updating procedures and standards<\/p>\n\n<h3>DECLARACI\u00d3N DE AUTORIDAD SOBRE LA POL\u00cdTICA<\/h3>\n\n<p data-start=\"4897\" data-end=\"5191\">The Information Security Committee is responsible for enforcing and monitoring compliance with this policy and may propose corrective or preventive actions.<br data-start=\"5053\" data-end=\"5056\" \/>All departments and employees must comply with the policy, and suppliers may be required to adhere to specific security requirements.<\/p>\n<p data-start=\"5193\" data-end=\"5330\">The policy will be reviewed periodically, at least annually, and whenever relevant regulatory, operational, or strategic changes arise.<\/p>\n<p data-start=\"5332\" data-end=\"5585\">In case of misuse, violation of this policy, or regulatory non-compliance \u2014 especially related to data protection \u2014 disciplinary or legal actions may be taken, following applicable law, including employee rights under Article 18 of the Workers\u2019 Statute.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fda87ce e-flex e-con-boxed e-con e-parent\" data-id=\"fda87ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34ea15c elementor-widget elementor-widget-spacer\" data-id=\"34ea15c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>INFORMATION SECURITY POLICY Information Security Management System Policy reviewed annually \u00a0 OBJECTIVE The purpose of this Information Security Policy, part of the Information Security Management System (ISMS), is to define Travel Compositor\u2019s security management guidelines. These guidelines ensure that access, use and protection of all information assets are carried out in accordance with business requirements, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12313","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Corporate information security policy | Travel Compositor - The Holistic System by TravelSoft<\/title>\n<meta name=\"description\" content=\"Technological solutions for travel agency networks, tour operators, OTAs and DMCs. Power your business with our tools.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/travelcompositor.com\/es\/corporate-information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Corporate information security policy | Travel Compositor - The Holistic System by TravelSoft\" \/>\n<meta property=\"og:description\" content=\"Technological solutions for travel agency networks, tour operators, OTAs and DMCs. Power your business with our tools.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/travelcompositor.com\/es\/corporate-information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Travel Compositor - The Holistic System by TravelSoft\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T15:05:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/travelcompositor.com\/wp-content\/uploads\/2023\/04\/travelcompositor-web-demo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@TravelC_online\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/travelcompositor.com\\\/corporate-information-security-policy\\\/\",\"url\":\"https:\\\/\\\/travelcompositor.com\\\/corporate-information-security-policy\\\/\",\"name\":\"Corporate information security policy | Travel Compositor - The Holistic System by TravelSoft\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/travelcompositor.com\\\/es\\\/#website\"},\"datePublished\":\"2023-11-22T10:05:58+00:00\",\"dateModified\":\"2025-11-17T15:05:33+00:00\",\"description\":\"Technological solutions for travel agency networks, tour operators, OTAs and DMCs. Power your business with our tools.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/travelcompositor.com\\\/corporate-information-security-policy\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/travelcompositor.com\\\/corporate-information-security-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/travelcompositor.com\\\/corporate-information-security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/travelcompositor.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Corporate information security policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/travelcompositor.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/travelcompositor.com\\\/es\\\/\",\"name\":\"Travel Compositor - The Holistic System by TravelSoft\",\"description\":\"El \u00fanico sistema Hol\u00edstico de venta de viajes. nuestra tecnolog\u00eda ofrece todos los servicios necesarios para un viaje en una sola sesi\u00f3n y pago. Porque tenemos un modelo disponible para cada tipo de empresas de turismo, viajes y ocio. Porque ofrecemos un mundo servicios y valores a\u00f1adidos alrededor de la tecnolog\u00eda convirtiendonos en algo m\u00e1s que un proveedor, un generador de negocio y tu mejor socio para tu \u00e9xito y crecimiento.\",\"publisher\":{\"@id\":\"https:\\\/\\\/travelcompositor.com\\\/es\\\/#organization\"},\"alternateName\":\"Travel Compositor - The Holistic System by TravelSoft\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/travelcompositor.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/travelcompositor.com\\\/es\\\/#organization\",\"name\":\"Travel Compositor - The Holistic System by TravelSoft\",\"alternateName\":\"TravelC\",\"url\":\"https:\\\/\\\/travelcompositor.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/travelcompositor.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Travel Compositor - The Holistic System by TravelSoft\"},\"image\":{\"@id\":\"https:\\\/\\\/travelcompositor.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/TravelC_online\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/travelcompositor\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC7fnIOjOmM55eHolZtlIpsw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Corporate information security policy | Travel Compositor - The Holistic System by TravelSoft","description":"Technological solutions for travel agency networks, tour operators, OTAs and DMCs. Power your business with our tools.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/travelcompositor.com\/es\/corporate-information-security-policy\/","og_locale":"es_ES","og_type":"article","og_title":"Corporate information security policy | Travel Compositor - The Holistic System by TravelSoft","og_description":"Technological solutions for travel agency networks, tour operators, OTAs and DMCs. Power your business with our tools.","og_url":"https:\/\/travelcompositor.com\/es\/corporate-information-security-policy\/","og_site_name":"Travel Compositor - The Holistic System by TravelSoft","article_modified_time":"2025-11-17T15:05:33+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/travelcompositor.com\/wp-content\/uploads\/2023\/04\/travelcompositor-web-demo.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@TravelC_online","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/travelcompositor.com\/corporate-information-security-policy\/","url":"https:\/\/travelcompositor.com\/corporate-information-security-policy\/","name":"Corporate information security policy | Travel Compositor - The Holistic System by TravelSoft","isPartOf":{"@id":"https:\/\/travelcompositor.com\/es\/#website"},"datePublished":"2023-11-22T10:05:58+00:00","dateModified":"2025-11-17T15:05:33+00:00","description":"Technological solutions for travel agency networks, tour operators, OTAs and DMCs. Power your business with our tools.","breadcrumb":{"@id":"https:\/\/travelcompositor.com\/corporate-information-security-policy\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/travelcompositor.com\/corporate-information-security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/travelcompositor.com\/corporate-information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/travelcompositor.com\/"},{"@type":"ListItem","position":2,"name":"Corporate information security policy"}]},{"@type":"WebSite","@id":"https:\/\/travelcompositor.com\/es\/#website","url":"https:\/\/travelcompositor.com\/es\/","name":"Travel Compositor - The Holistic System by TravelSoft","description":"El \u00fanico sistema Hol\u00edstico de venta de viajes. nuestra tecnolog\u00eda ofrece todos los servicios necesarios para un viaje en una sola sesi\u00f3n y pago. Porque tenemos un modelo disponible para cada tipo de empresas de turismo, viajes y ocio. Porque ofrecemos un mundo servicios y valores a\u00f1adidos alrededor de la tecnolog\u00eda convirtiendonos en algo m\u00e1s que un proveedor, un generador de negocio y tu mejor socio para tu \u00e9xito y crecimiento.","publisher":{"@id":"https:\/\/travelcompositor.com\/es\/#organization"},"alternateName":"Travel Compositor - The Holistic System by TravelSoft","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/travelcompositor.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/travelcompositor.com\/es\/#organization","name":"Travel Compositor - The Holistic System by TravelSoft","alternateName":"TravelC","url":"https:\/\/travelcompositor.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/travelcompositor.com\/es\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Travel Compositor - The Holistic System by TravelSoft"},"image":{"@id":"https:\/\/travelcompositor.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/TravelC_online","https:\/\/www.linkedin.com\/company\/travelcompositor\/","https:\/\/www.youtube.com\/channel\/UC7fnIOjOmM55eHolZtlIpsw"]}]}},"_links":{"self":[{"href":"https:\/\/travelcompositor.com\/es\/wp-json\/wp\/v2\/pages\/12313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/travelcompositor.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/travelcompositor.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/travelcompositor.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/travelcompositor.com\/es\/wp-json\/wp\/v2\/comments?post=12313"}],"version-history":[{"count":34,"href":"https:\/\/travelcompositor.com\/es\/wp-json\/wp\/v2\/pages\/12313\/revisions"}],"predecessor-version":[{"id":16044,"href":"https:\/\/travelcompositor.com\/es\/wp-json\/wp\/v2\/pages\/12313\/revisions\/16044"}],"wp:attachment":[{"href":"https:\/\/travelcompositor.com\/es\/wp-json\/wp\/v2\/media?parent=12313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}