{"id":11761,"date":"2026-03-02T12:31:27","date_gmt":"2026-03-02T12:31:27","guid":{"rendered":"https:\/\/stage.thesinapiteam.com\/?page_id=11761"},"modified":"2026-03-19T17:32:45","modified_gmt":"2026-03-19T17:32:45","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/stage.thesinapiteam.com\/es\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"11761\" class=\"elementor elementor-11761\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22fb186 e-con-full e-flex e-con e-parent\" data-id=\"22fb186\" data-element_type=\"container\" data-e-type=\"container\" id=\"Team\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-e8140b9 e-con-full e-flex e-con e-child\" data-id=\"e8140b9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7f4757 elementor-widget elementor-widget-text-editor\" data-id=\"b7f4757\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tThe Sinapi Team\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe44b2a elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"fe44b2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security Policy.\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc4f509 e-con-full e-flex e-con e-child\" data-id=\"bc4f509\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad6c86f elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"ad6c86f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security Policy.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-805e2ad elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"805e2ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t1. Introduction\n<\/p>\nThis document establishes the SINAPI LLC policy based on the ISO 27001 standard.\nSINAPI LLC is a technology company dedicated to marketing and providing the following services:\n<\/p>\n\u2013 level 1, 2 and 3 technical support, specialized in localization and globalization of platforms, software and third party applications.\n<\/br>\n\u2013 development, evolutionary and corrective development of third party software.\n<\/br>\n\u2013 localization.\n<\/br>\n\u2013 Digital marketing.\n<\/p>\nSINAPI LLC is committed to ensuring the confidentiality, integrity and availability of information in all areas of the organization. To this end, it establishes an information security management system through a set of comprehensive measures and security controls for the protection of assets and sensitive data of the company and its customers, ensuring business continuity and preservation of information.\n<\/p>\nSINAPI LLC is committed to protect the assets and reputation of the organization, as well as to comply with relevant legal and regulatory requirements and its stakeholders in terms of information security.\n<\/p>\n2. Scope\n<\/p>\nThe scope of the implementation of ISO 27001 in SINAPI LLC applies to all persons in the company and third parties with access to SINAPI LCC information, including information accessed from third parties. It involves all activities of the organization.\nIt applies to all information assets, whether in electronic, printed or any other medium.\n<\/p>\n3. Responsibilities\n<\/p>\nExecutive management is responsible for ensuring that adequate resources are allocated to implement and maintain security measures.\n<\/p>\nIt is also responsible for ensuring that objectives and plans for the ISMS are established, and that these are reviewed at least annually.\n<\/p>\nThe Information Security Officer (ISO) oversees the implementation of policies, procedures, and controls. As well as defining and designing controls in support of asset owners.\n<\/p>\nThe area managers will be the owners of the assets and the risk thereof, as well as the definition and implementation of their controls with the support of the ISO.\n<\/p>\nAll employees are responsible for adhering to this policy and contributing to information security and should therefore be aware of the information security risks within their daily activities in the company.\n<\/p>\n4. Development of the policy:\n<\/p>\n4.1 Information Control and Access Control.\n<\/p>\nInformation classification levels are established to determine the levels of access and protection required to prevent unauthorized disclosure, modification, deletion or destruction of information stored on media.\n<\/p>\nInformation Access and Control\n<\/p>\nAccess permissions are assigned based on the principle of \u201cleast privilege\u201d. Access delimitation includes not only the information but also the information processing facilities.\nAn identity and access management system is implemented to manage user authorization.\nControls are established to ensure security in teleworking and the use of mobile devices.\n<\/p>\n4.2 Cryptographic controls\n<\/p>\nSINAPI LLC ensures the appropriate and effective use of cryptography to protect the confidentiality, authenticity and\/or integrity of information.\n<\/p>\n4.3 Physical and environmental protection\n<\/p>\nSINAPI LLC prevents unauthorized physical access, damage and interference to the organization\u2019s information and information processing facilities.\n<\/p>\n4.4 Safety of operations\n<\/p>\nAt SINAPI LCC:\n<\/p>\n\u2756 We ensure the correct and secure operation of information processing facilities.\n<\/br>\n\u2756 We ensure that information and information processing facilities are protected against malicious code and other technical vulnerabilities.\n<\/br>\n\u2756 We protect against data loss.\n<\/br>\n\u2756 We record events and generate evidence in our tracking system.\n<\/br>\n\u2756 We guarantee the integrity of systems in production.\n<\/br>\n4.5 Communications security\n<\/p>\nWe guarantee the protection of the information in the networks and their supporting information processing facilities.\n<\/p>\n4.6 Systems acquisition, development and maintenance\n<\/p>\nWe ensure that information security is an integral part of information systems throughout the entire life cycle and that the development of information systems is designed and implemented early with the active participation of the ISO in the projects.\n<\/p>\n4.7 Relationship with suppliers\n<\/p>\nWe ensure the protection of the organization\u2019s assets to which suppliers have access, maintaining an agreed level of information security and service delivery aligned with supplier agreements.\n<\/p>\n4.8. Secure Software Development\n<\/p>\nSecure development practices, such as code review, security testing, and vulnerability assessments, shall be followed.\n<\/p>\nSoftware components and libraries used shall be kept up to date.\n<\/p>\n4.9. Infrastructure Security\n<\/p>\nCritical systems are hosted in secure environments and updates are applied regularly.\n<\/p>\n4.10. Incident Response\n<\/p>\nAn incident response plan is maintained that includes procedures for detecting, reporting, and mitigating security incidents.\n<\/p>\nIncidents are documented and post-incident analysis is performed to improve security.\n<\/p>\n4.11 Information security aspects of business continuity management\n<\/p>\nWe consider information security continuity in SINAPI LCC\u2019s business continuity management systems, ensuring the availability of information processing facilities.\n<\/p>\n4.12. Training and Awareness\n<\/p>\nRegular security training programs are conducted for employees and contractors to ensure that everyone understands their responsibilities and is aware of threats and best practices. This ensures that people performing work under the organization\u2019s control understand their responsibilities and are suitable for the roles for which they are being considered.\n<\/p>\nInformation security awareness is provided through awareness campaigns.\n<\/p>\n4.13. Legal and Regulatory Compliance\n<\/p>\nThe company complies with applicable data protection and information security laws and regulations.\nProcedures are in place to ensure compliance with relevant standards (ISO 27001 applicable).\n<\/p>\n5. Policy Review\n<\/p>\nThis policy is reviewed at least annually to ensure its relevance and effectiveness in a constantly evolving environment.\nContinuous improvement is a fundamental pillar to maintain and update the ISMS in accordance with changing security threats and requirements.\n<\/p>\n6. Related documents\n<\/p>\nThe information security manual expands on the information contained in each point of this policy.\n<\/p>\n7. Approval and Disclosure\n<\/p>\nAll employees, contractors and third parties must read, understand and accept this policy before interacting with SINAPI LCC systems and information.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8904049 elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"8904049\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tVersion 1.0\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The Sinapi Team Information Security Policy. Information Security Policy. 1. Introduction This document establishes the SINAPI LLC policy based on the ISO 27001 standard. SINAPI LLC is a technology company dedicated to marketing and providing the following services: \u2013 level 1, 2 and 3 technical support, specialized in localization and globalization of platforms, software and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-11761","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Policy - The Sinapi Team<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy - The Sinapi Team\" \/>\n<meta property=\"og:description\" content=\"The Sinapi Team Information Security Policy. Information Security Policy. 1. Introduction This document establishes the SINAPI LLC policy based on the ISO 27001 standard. SINAPI LLC is a technology company dedicated to marketing and providing the following services: \u2013 level 1, 2 and 3 technical support, specialized in localization and globalization of platforms, software and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stage.thesinapiteam.com\/es\/information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"The Sinapi Team\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T17:32:45+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/information-security-policy\\\/\",\"url\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/information-security-policy\\\/\",\"name\":\"Information Security Policy - The Sinapi Team\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/#website\"},\"datePublished\":\"2026-03-02T12:31:27+00:00\",\"dateModified\":\"2026-03-19T17:32:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/information-security-policy\\\/#breadcrumb\"},\"inLanguage\":\"es-AR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/stage.thesinapiteam.com\\\/information-security-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/information-security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/#website\",\"url\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/\",\"name\":\"The Sinapi Team\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-AR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/#organization\",\"name\":\"The Sinapi Team\",\"url\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-AR\",\"@id\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/logo-sinapi-footer.svg\",\"contentUrl\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/logo-sinapi-footer.svg\",\"width\":255,\"height\":83,\"caption\":\"The Sinapi Team\"},\"image\":{\"@id\":\"https:\\\/\\\/stage.thesinapiteam.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy - The Sinapi Team","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Information Security Policy - The Sinapi Team","og_description":"The Sinapi Team Information Security Policy. Information Security Policy. 1. Introduction This document establishes the SINAPI LLC policy based on the ISO 27001 standard. SINAPI LLC is a technology company dedicated to marketing and providing the following services: \u2013 level 1, 2 and 3 technical support, specialized in localization and globalization of platforms, software and [&hellip;]","og_url":"https:\/\/stage.thesinapiteam.com\/es\/information-security-policy\/","og_site_name":"The Sinapi Team","article_modified_time":"2026-03-19T17:32:45+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/stage.thesinapiteam.com\/information-security-policy\/","url":"https:\/\/stage.thesinapiteam.com\/information-security-policy\/","name":"Information Security Policy - The Sinapi Team","isPartOf":{"@id":"https:\/\/stage.thesinapiteam.com\/#website"},"datePublished":"2026-03-02T12:31:27+00:00","dateModified":"2026-03-19T17:32:45+00:00","breadcrumb":{"@id":"https:\/\/stage.thesinapiteam.com\/information-security-policy\/#breadcrumb"},"inLanguage":"es-AR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stage.thesinapiteam.com\/information-security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/stage.thesinapiteam.com\/information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/stage.thesinapiteam.com\/"},{"@type":"ListItem","position":2,"name":"Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/stage.thesinapiteam.com\/#website","url":"https:\/\/stage.thesinapiteam.com\/","name":"The Sinapi Team","description":"","publisher":{"@id":"https:\/\/stage.thesinapiteam.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stage.thesinapiteam.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-AR"},{"@type":"Organization","@id":"https:\/\/stage.thesinapiteam.com\/#organization","name":"The Sinapi Team","url":"https:\/\/stage.thesinapiteam.com\/","logo":{"@type":"ImageObject","inLanguage":"es-AR","@id":"https:\/\/stage.thesinapiteam.com\/#\/schema\/logo\/image\/","url":"https:\/\/stage.thesinapiteam.com\/wp-content\/uploads\/2025\/11\/logo-sinapi-footer.svg","contentUrl":"https:\/\/stage.thesinapiteam.com\/wp-content\/uploads\/2025\/11\/logo-sinapi-footer.svg","width":255,"height":83,"caption":"The Sinapi Team"},"image":{"@id":"https:\/\/stage.thesinapiteam.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/stage.thesinapiteam.com\/es\/wp-json\/wp\/v2\/pages\/11761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stage.thesinapiteam.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/stage.thesinapiteam.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/stage.thesinapiteam.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/stage.thesinapiteam.com\/es\/wp-json\/wp\/v2\/comments?post=11761"}],"version-history":[{"count":11,"href":"https:\/\/stage.thesinapiteam.com\/es\/wp-json\/wp\/v2\/pages\/11761\/revisions"}],"predecessor-version":[{"id":13439,"href":"https:\/\/stage.thesinapiteam.com\/es\/wp-json\/wp\/v2\/pages\/11761\/revisions\/13439"}],"wp:attachment":[{"href":"https:\/\/stage.thesinapiteam.com\/es\/wp-json\/wp\/v2\/media?parent=11761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}