{"id":10600,"date":"2025-01-28T13:22:39","date_gmt":"2025-01-28T11:22:39","guid":{"rendered":"https:\/\/mrhouston.net\/?page_id=10600"},"modified":"2025-02-10T10:58:40","modified_gmt":"2025-02-10T08:58:40","slug":"general-information-security-policy","status":"publish","type":"page","link":"https:\/\/mrhouston.net\/en\/general-information-security-policy\/","title":{"rendered":"General information security policy"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; fullwidth=\u00bbon\u00bb _builder_version=\u00bb3.22&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_fullwidth_post_title meta=\u00bboff\u00bb featured_image=\u00bboff\u00bb admin_label=\u00bbTitulo de pagina (automatico)\u00bb _builder_version=\u00bb3.19.4&#8243; title_font=\u00bb|||on|||||\u00bb title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb25px\u00bb title_letter_spacing=\u00bb1px\u00bb background_color=\u00bb#ff6816&#8243; background_image=\u00bbhttps:\/\/mrhouston.net\/wp-content\/uploads\/2019\/01\/geometric-bg-overlay-01.jpg\u00bb background_blend=\u00bbluminosity\u00bb custom_padding=\u00bb47px||33px\u00bb title_text_shadow_style=\u00bbpreset4&#8243; global_colors_info=\u00bb{}\u00bb][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb3.22&#8243; custom_margin=\u00bb15px|0px|15px|0px\u00bb custom_padding=\u00bb0px|0px|0px|0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb3.25&#8243; custom_margin=\u00bb0px||0px|\u00bb custom_padding=\u00bb0px|0px|0px|0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb0px|0px|0px|0px\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_code admin_label=\u00bbBreadcrumbs\u00bb _builder_version=\u00bb3.19.4&#8243; global_colors_info=\u00bb{}\u00bb]<ul id=\"mrH-breadcrumbs\" class=\"mrH-breadcrumbs\"><li class=\"item-home\"><a class=\"bread-link bread-home\" href=\"https:\/\/mrhouston.net\" title=\"Inicio\">Inicio<\/a><\/li><li class=\"separator separator-home\"> &gt; <\/li><\/ul>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb3.22&#8243; custom_padding=\u00bb0|0px|48px|0px|false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb3.25&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb3.25&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb][et_pb_text _builder_version=\u00bb4.11.4&#8243; header_3_font=\u00bb|||on|||||\u00bb header_3_text_color=\u00bb#111111&#8243; header_3_font_size=\u00bb18px\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2>Objective<\/h2>\n<p>Information is a fundamental asset for Mr. Houston.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10611 alignnone \" src=\"https:\/\/mrhouston.net\/wp-content\/uploads\/2025\/02\/logo_mrByte.png\" alt=\"\" width=\"118\" height=\"45\" \/>\u00a0 \u00a0 \u00a0 <img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10613 alignnone \" src=\"https:\/\/mrhouston.net\/wp-content\/uploads\/2025\/02\/logo_mrKeylock.png\" alt=\"\" width=\"155\" height=\"45\" \/>\u00a0 \u00a0 <img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10608 alignnone \" src=\"https:\/\/mrhouston.net\/wp-content\/uploads\/2025\/02\/BITWOK_verde-y-negro_.png\" alt=\"\" width=\"148\" height=\"63\" \/> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/mrhouston.net\/wp-content\/uploads\/2025\/02\/mrhouston-.png\" width=\"178\" height=\"68\" alt=\"\" class=\"wp-image-10625 alignnone size-full\" \/><\/p>\n<p>Therefore, we are committed to ensuring its confidentiality, integrity, and availability, aligning our practices with international security standards, particularly the ISO\/IEC 27001 standard.<\/p>\n<h3>Scope<\/h3>\n<p>This policy applies to all employees, contractors, suppliers, and any other stakeholders who have access to Mr. Houston&#8217;s information and systems, regardless of their location or format.<\/p>\n<p>&nbsp;<\/p>\n<h3>Objectives and Commitment<\/h3>\n<p>The management, on behalf of Mr. Houston, is committed to achieving the following general objectives:<\/p>\n<p>1.- Ensure the security of information by safeguarding its confidentiality, integrity, and availability.<\/p>\n<p>2.- Foster a culture of responsibility in information security, promoting continuous awareness and training.<\/p>\n<p>3.-\u00a0 Comply with legal, regulatory, and contractual requirements related to information security, personal data protection, intellectual property protection, and any other relevant regulations.<\/p>\n<p>4.-\u00a0 Adopt standards and best practices in information security.<\/p>\n<p>5.-\u00a0 Design, implement, and maintain an appropriate Information Security Management System (ISMS).<\/p>\n<p>6.-\u00a0 Establish and periodically review these information security objectives, aligned with the organization&#8217;s purpose and strategy, as well as identified threats and the fundamental principles of information security described in this policy.<\/p>\n<p>7.- Ensure the oversight and monitoring of compliance with these information security objectives.<\/p>\n<p>8.-\u00a0 Provide the organization with the necessary resources (technological, human, and financial) to ensure the protection of information.<\/p>\n<p>9.- Identify, assess, and address risks to which the organization is exposed in a continuous and diligent manner.<\/p>\n<p>10.-\u00a0 Work on self-assessment and continuous improvement, identifying opportunities to optimize information security.<\/p>\n<p>&nbsp;<\/p>\n<h3>Fundamental Principles of Information Security<\/h3>\n<p>In all actions and decisions related to information security, Mr. Houston will be guided by the following fundamental principles:<\/p>\n<p>&#8211; Protection of information, ensuring its confidentiality, integrity, and availability.<\/p>\n<p>&#8211; Legal and regulatory compliance, ensuring adaptation to applicable regulations and requirements.<\/p>\n<p>&#8211; Risk management, identifying, assessing, and mitigating potential threats and vulnerabilities to protect information assets.<\/p>\n<p>&#8211; Training and awareness, promoting the active responsibility of all collaborators through awareness programs.<\/p>\n<p>&#8211; Continuous improvement, optimizing processes, tools, and security measures to respond to Mr. Houston&#8217;s context.<\/p>\n<p>&nbsp;<\/p>\n<h3>Dissemination and Communication<\/h3>\n<p>This policy will be communicated and made publicly available to all stakeholders, both internal and external to the organization.<\/p>\n<p>The document will be published through appropriate channels to ensure access for stakeholders, such as the organization&#8217;s public website, corporate intranet, and internal document management system to facilitate access for internal personnel.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Responsibilities\u00a0<\/strong><\/p>\n<p><strong>&#8211; The Management of Mr. Houston<\/strong> is responsible for defining, disseminating, promoting, and overseeing this policy, as well as ensuring that the necessary resources are allocated for its proper implementation.<\/p>\n<p>&#8211;<strong> The Cybersecurity Coordination Committee<\/strong> (CCC) is a multidisciplinary body responsible for overseeing, advising, and ensuring the implementation, updating, and compliance of the organization&#8217;s Security Plan, aligned with standards such as ISO 27001, managing risks, and coordinating responses to critical incidents.<\/p>\n<p>&#8211; <strong>The organization&#8217;s Cybersecurity Officer<\/strong> is responsible for the implementation, oversight, and improvement of the ISMS, coordinating security initiatives, and managing information-related incidents.<\/p>\n<p><strong>The IT Technical Team of Mr. Houston<\/strong> is responsible for the technical means necessary to ensure the operation of the ISMS.<\/p>\n<p>All<strong> employees and collaborators<\/strong> of the company must comply with this policy and the regulations derived from it. They are responsible for safeguarding information security in their daily activities. They have the duty to report any information security incident as soon as they become aware of it through the channels established by the organization.<\/p>\n<p>&nbsp;<\/p>\n<h3>Review and Approval<\/h3>\n<p>This policy will be periodically reviewed and updated according to the organization&#8217;s needs and changes in the environment.<\/p>\n<p>Approved by the Management Committee of Mr. Houston on January 22, 2025.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><ul id=\"mrH-breadcrumbs\" class=\"mrH-breadcrumbs\"><li class=\"item-home\"><a class=\"bread-link bread-home\" href=\"https:\/\/mrhouston.net\" title=\"Inicio\">Inicio<\/a><\/li><li class=\"separator separator-home\"> &gt; <\/li><\/ul>Objective Information is a fundamental asset for Mr. Houston. \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Therefore, we are committed to ensuring its confidentiality, integrity, and availability, aligning our practices with international security standards, particularly the ISO\/IEC 27001 standard. Scope This policy applies to all employees, contractors, suppliers, and any other stakeholders who have access to Mr. Houston&#8217;s information and systems, regardless of their location or format. &nbsp; Objectives and Commitment The management, on behalf of Mr. Houston, is committed to achieving<\/p>\n<div class=\"view-full-post\"><a href=\"https:\/\/mrhouston.net\/en\/general-information-security-policy\/\" class=\"view-full-post-btn\">Leer Mas<\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-10600","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>General information security policy - mrHouston Tech Solutions<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"General information security policy - mrHouston Tech Solutions\" \/>\n<meta property=\"og:description\" content=\"Objective Information is a fundamental asset for Mr. Houston. \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Therefore, we are committed to ensuring its confidentiality, integrity, and availability, aligning our practices with international security standards, particularly the ISO\/IEC 27001 standard. Scope This policy applies to all employees, contractors, suppliers, and any other stakeholders who have access to Mr. Houston&#039;s information and systems, regardless of their location or format. &nbsp; Objectives and Commitment The management, on behalf of Mr. Houston, is committed to achieving Leer Mas\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mrhouston.net\/en\/general-information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"mrHouston Tech Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-10T08:58:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mrhouston.net\/wp-content\/uploads\/2025\/02\/logo_mrByte.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@mrHoustontech\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/general-information-security-policy\\\/\",\"url\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/general-information-security-policy\\\/\",\"name\":\"General information security policy - mrHouston Tech Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/general-information-security-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/general-information-security-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mrhouston.net\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo_mrByte.png\",\"datePublished\":\"2025-01-28T11:22:39+00:00\",\"dateModified\":\"2025-02-10T08:58:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/general-information-security-policy\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mrhouston.net\\\/en\\\/general-information-security-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/general-information-security-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mrhouston.net\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo_mrByte.png\",\"contentUrl\":\"https:\\\/\\\/mrhouston.net\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo_mrByte.png\",\"width\":591,\"height\":226},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/en\\\/general-information-security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mrhouston.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"General information security policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#website\",\"url\":\"https:\\\/\\\/mrhouston.net\\\/\",\"name\":\"Mr. Houston Tech Solutions\",\"description\":\"Potenciamos tu negocio mediante la tecnolog\u00eda.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mrhouston.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#organization\",\"name\":\"Mr. Houston\",\"url\":\"https:\\\/\\\/mrhouston.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mrhouston.net\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/logo_mrHouston.jpg\",\"contentUrl\":\"https:\\\/\\\/mrhouston.net\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/logo_mrHouston.jpg\",\"width\":250,\"height\":250,\"caption\":\"Mr. Houston\"},\"image\":{\"@id\":\"https:\\\/\\\/mrhouston.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/mrHoustontech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mr-houston-tech-solutions\\\/mycompany\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UC3C9rLSc8yB6d6IkWi789dw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"General information security policy - mrHouston Tech Solutions","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"es_ES","og_type":"article","og_title":"General information security policy - mrHouston Tech Solutions","og_description":"Objective Information is a fundamental asset for Mr. Houston. \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Therefore, we are committed to ensuring its confidentiality, integrity, and availability, aligning our practices with international security standards, particularly the ISO\/IEC 27001 standard. Scope This policy applies to all employees, contractors, suppliers, and any other stakeholders who have access to Mr. Houston's information and systems, regardless of their location or format. &nbsp; Objectives and Commitment The management, on behalf of Mr. Houston, is committed to achieving Leer Mas","og_url":"https:\/\/mrhouston.net\/en\/general-information-security-policy\/","og_site_name":"mrHouston Tech Solutions","article_modified_time":"2025-02-10T08:58:40+00:00","og_image":[{"url":"https:\/\/mrhouston.net\/wp-content\/uploads\/2025\/02\/logo_mrByte.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@mrHoustontech","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mrhouston.net\/en\/general-information-security-policy\/","url":"https:\/\/mrhouston.net\/en\/general-information-security-policy\/","name":"General information security policy - mrHouston Tech Solutions","isPartOf":{"@id":"https:\/\/mrhouston.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mrhouston.net\/en\/general-information-security-policy\/#primaryimage"},"image":{"@id":"https:\/\/mrhouston.net\/en\/general-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/mrhouston.net\/wp-content\/uploads\/2025\/02\/logo_mrByte.png","datePublished":"2025-01-28T11:22:39+00:00","dateModified":"2025-02-10T08:58:40+00:00","breadcrumb":{"@id":"https:\/\/mrhouston.net\/en\/general-information-security-policy\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mrhouston.net\/en\/general-information-security-policy\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/mrhouston.net\/en\/general-information-security-policy\/#primaryimage","url":"https:\/\/mrhouston.net\/wp-content\/uploads\/2025\/02\/logo_mrByte.png","contentUrl":"https:\/\/mrhouston.net\/wp-content\/uploads\/2025\/02\/logo_mrByte.png","width":591,"height":226},{"@type":"BreadcrumbList","@id":"https:\/\/mrhouston.net\/en\/general-information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mrhouston.net\/"},{"@type":"ListItem","position":2,"name":"General information security policy"}]},{"@type":"WebSite","@id":"https:\/\/mrhouston.net\/#website","url":"https:\/\/mrhouston.net\/","name":"Mr. Houston Tech Solutions","description":"Potenciamos tu negocio mediante la tecnolog\u00eda.","publisher":{"@id":"https:\/\/mrhouston.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mrhouston.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/mrhouston.net\/#organization","name":"Mr. Houston","url":"https:\/\/mrhouston.net\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/mrhouston.net\/#\/schema\/logo\/image\/","url":"https:\/\/mrhouston.net\/wp-content\/uploads\/2021\/06\/logo_mrHouston.jpg","contentUrl":"https:\/\/mrhouston.net\/wp-content\/uploads\/2021\/06\/logo_mrHouston.jpg","width":250,"height":250,"caption":"Mr. Houston"},"image":{"@id":"https:\/\/mrhouston.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/mrHoustontech","https:\/\/www.linkedin.com\/company\/mr-houston-tech-solutions\/mycompany\/","https:\/\/www.youtube.com\/channel\/UC3C9rLSc8yB6d6IkWi789dw"]}]}},"_links":{"self":[{"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/pages\/10600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/comments?post=10600"}],"version-history":[{"count":0,"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/pages\/10600\/revisions"}],"wp:attachment":[{"href":"https:\/\/mrhouston.net\/wp-json\/wp\/v2\/media?parent=10600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}