INFORMATION SECURITY

The Security Policy establishes the guidelines and principles established by Horus ML to guarantee the protection of the information, as well as the fulfillment of the defined security objectives, thus ensuring the confidentiality, integrity and availability of the information systems and of course, guaranteeing the fulfillment of all the applicable legal obligations.

The management of Horus ML, aware of the importance of information security in the workplace, assumes and provides the following commitments with respect to the Information Security Management System (ISMS):

  • Ensure that information security objectives are established, always aligned with the company's strategy.
  • Ensure that security requirements are integrated into the organization's processes.
  • Ensure the necessary resources for the management system.
  • Communicate the importance of effective information security management in accordance with the requirements of the information security management system.
  • Ensure that the information security management system achieves its intended results.
  • Lead and support people to contribute to the effectiveness of the information security management system.
  • Promote continuous improvement of the management system.

And support the relevant roles to demonstrate their leadership applied to their areas of responsibility. To this end, management will ensure that Horus ML personnel comply with regulations, policies, procedures and instructions relating to information security.

Through the development of its Information Security Management System, Horus ML aims to ensure the following security objectives:

  • Ensure confidentiality, integrity and availability of information.
  • Comply with all applicable legal requirements.
  • To have a continuity plan that allows the recovery of processes and activities in the event of an incident, in the shortest possible time.
  • Train and raise awareness of information security among all employees.
  • To meet the safety expectations and needs of customers, employees, suppliers and other stakeholders.
  • Proper management of all incidents that occur.
  • All employees will be informed of their safety roles and obligations and are responsible for fulfilling them.
  • Continuously improve the ISMS and therefore the organization's information security.

Cookies Acceptance Banner
We care about your data and only use cookies to improve your experience. By using this website, you agree to our Cookies Policy.