{"id":4410,"date":"2025-06-11T10:08:36","date_gmt":"2025-06-11T10:08:36","guid":{"rendered":"https:\/\/epikacomunicacion.com\/?page_id=4410"},"modified":"2025-11-17T16:54:51","modified_gmt":"2025-11-17T16:54:51","slug":"seguridad","status":"publish","type":"page","link":"https:\/\/epikacomunicacion.com\/en\/seguridad\/","title":{"rendered":"Seguridad"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"4410\" class=\"elementor elementor-4410\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e41af3 e-flex e-con-boxed e-con e-parent\" data-id=\"4e41af3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9734fb elementor-widget elementor-widget-text-editor\" data-id=\"f9734fb\" data-element_type=\"widget\" data-no-translation=\"\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>.elementor-element-f9734fb{display:none !important}<\/style>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4430f3b elementor-widget elementor-widget-text-editor\" data-id=\"4430f3b\" data-element_type=\"widget\" data-no-translation=\"\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h1 data-start=\"67\" data-end=\"100\"><strong data-start=\"69\" data-end=\"100\">INFORMATION SECURITY POLICY<\/strong><\/h1><p data-start=\"102\" data-end=\"523\"><strong data-start=\"102\" data-end=\"132\">Epika Comunicaci\u00f3n, S.L.U.<\/strong>, hereinafter referred to as <strong data-start=\"161\" data-end=\"170\">EPIKA<\/strong>, considers information\u2014especially client-related information\u2014and the associated systems to be critical assets that must be adequately protected to ensure the proper functioning of the company, always aligning this policy with the ISO\/IEC 27001:2022 standard, which <strong data-start=\"436\" data-end=\"445\">EPIKA<\/strong> obtained certification for on September 19, 2025, from the company Applus+.<\/p><p data-start=\"525\" data-end=\"956\">This security policy aims to guarantee the <strong data-start=\"568\" data-end=\"640\">confidentiality, integrity, availability, and privacy of information<\/strong>, as well as compliance with the different applicable regulations and requirements in force at any given time, maintaining a balance between risk levels and the efficient use of resources based on proportionality criteria. Indeed, it provides a reference framework for establishing information security objectives.<\/p><p data-start=\"958\" data-end=\"1064\">The information security management system supports the processes, resources, and activities related to:<\/p><ul data-start=\"1066\" data-end=\"1515\"><li data-start=\"1066\" data-end=\"1184\"><p data-start=\"1068\" data-end=\"1184\">The management, planning, design, execution, and evaluation of advertising campaigns and communication strategies.<\/p><\/li><li data-start=\"1185\" data-end=\"1260\"><p data-start=\"1187\" data-end=\"1260\">The management and administration of social media on behalf of clients.<\/p><\/li><li data-start=\"1261\" data-end=\"1515\"><p data-start=\"1263\" data-end=\"1515\">The organization and coordination of corporate and promotional events, both in-person and virtual, including the processing of information from clients, suppliers, and external collaborators, in accordance with the current Statement of Applicability.<\/p><\/li><\/ul><p data-start=\"1517\" data-end=\"1765\">All of this is based on <strong data-start=\"1541\" data-end=\"1706\">people development, a sense of belonging to the organization, personal fulfillment, optimal and efficient use of resources, process management, and risk analysis<\/strong> as essential elements to achieve continuous improvement.<\/p><p data-start=\"1767\" data-end=\"1940\">Aware of the need for internationally recognized standardized systems, the organization has aligned its Information Security Management System with <strong data-start=\"1915\" data-end=\"1937\">ISO\/IEC 27001:2022<\/strong>.<\/p><p data-start=\"1942\" data-end=\"2127\">Therefore, <strong data-start=\"1953\" data-end=\"1967\">Management<\/strong> commits to leading and maintaining an <strong data-start=\"2006\" data-end=\"2039\">Information Management System<\/strong> within the organization based on continuous improvement and the following guidelines:<\/p><ul data-start=\"2129\" data-end=\"3362\"><li data-start=\"2129\" data-end=\"2394\"><p data-start=\"2131\" data-end=\"2394\">A strong commitment to understanding the needs and expectations of our clients and other interested parties, in order to achieve their satisfaction, and continuous improvement by establishing and periodically verifying the fulfillment of established objectives.<\/p><\/li><li data-start=\"2395\" data-end=\"2497\"><p data-start=\"2397\" data-end=\"2497\">Commitment to comply with applicable laws and regulations, as well as any subscribed requirements.<\/p><\/li><li data-start=\"2498\" data-end=\"3137\"><p data-start=\"2500\" data-end=\"3137\">Ensuring the security of information for both the organization and its clients. Our activity involves processing various information as a means of executing essential business processes. Recognizing that information systems, applications, communication infrastructures, files, and databases are significant company assets, management prioritizes <strong data-start=\"2846\" data-end=\"2894\">confidentiality, integrity, and availability<\/strong> of information when defining and delimiting objectives and responsibilities for various technical and organizational activities, and monitors compliance with the legal framework, specific directives and policies, and established procedures.<\/p><\/li><li data-start=\"3139\" data-end=\"3362\"><p data-start=\"3141\" data-end=\"3362\">Commitment to continuously review competencies and promote ongoing improvement to guarantee the security of service information and the organization\u2019s capacity to meet the increasing challenges presented by our clients.<\/p><\/li><\/ul><p data-start=\"3364\" data-end=\"3556\">To develop the organization\u2019s explicit commitment to continuous improvement of the management system, <strong data-start=\"3466\" data-end=\"3480\">Management<\/strong> establishes the following principles for information security management:<\/p><ol data-start=\"3558\" data-end=\"4642\"><li data-start=\"3558\" data-end=\"3716\"><p data-start=\"3561\" data-end=\"3716\">Ensure that EPIKA\u2019s Information Systems have an appropriate level of security and resilience as proposed by the company\u2019s Information Security Committee.<\/p><\/li><li data-start=\"3717\" data-end=\"3924\"><p data-start=\"3720\" data-end=\"3924\">Raise awareness among all collaborators about security risks and ensure that they have the necessary training and technological capabilities to protect the security of the company\u2019s information systems.<\/p><\/li><li data-start=\"3925\" data-end=\"4108\"><p data-start=\"3928\" data-end=\"4108\">Equip the company with procedures and tools for analysis, prevention, detection, response, and recovery that allow agile adaptation to technological changes and emerging threats.<\/p><\/li><li data-start=\"4109\" data-end=\"4248\"><p data-start=\"4112\" data-end=\"4248\">Collaborate with relevant governmental bodies and agencies to enhance company security and ensure compliance with current legislation.<\/p><\/li><li data-start=\"4249\" data-end=\"4379\"><p data-start=\"4252\" data-end=\"4379\">Define a set of security functions and responsibilities, clearly assigned and detailed in the corporate organizational chart.<\/p><\/li><li data-start=\"4380\" data-end=\"4479\"><p data-start=\"4383\" data-end=\"4479\">Ensure diligence by all employees and collaborators in reporting potential security incidents.<\/p><\/li><li data-start=\"4480\" data-end=\"4642\"><p data-start=\"4483\" data-end=\"4642\">Support a process of continuous review and updating of the security management model to adapt at all times to emerging threats that could affect the company.<\/p><\/li><\/ol><p data-start=\"4644\" data-end=\"4736\">This policy applies to <strong data-start=\"4667\" data-end=\"4733\">all employees, managers, partners, and administrators of EPIKA<\/strong>.<\/p><p data-start=\"4738\" data-end=\"4810\">This policy is <strong data-start=\"4753\" data-end=\"4787\">reviewed and approved annually<\/strong> by EPIKA Management.<\/p><p data-start=\"4812\" data-end=\"4966\">For any additional information about our Information Security Policy or to provide suggestions, you may send an email to <strong data-start=\"4933\" data-end=\"4963\"><a class=\"decorated-link cursor-pointer\" rel=\"noopener\" data-start=\"4935\" data-end=\"4961\">hola@epikacomunicacion.com<\/a><\/strong>.<\/p><p data-start=\"4968\" data-end=\"5003\"><strong data-start=\"4968\" data-end=\"5001\">Last updated: October 1, 2025<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N Epika Comunicaci\u00f3n, S.L.U., en adelante EPIKA, considera que la informaci\u00f3n, en especial la relativa a clientes, y los distintos sistemas asociados son activos cr\u00edticos que deben ser protegidos adecuadamente para asegurar el correcto funcionamiento de la empresa, siempre adecuando dicha pol\u00edtica a la norma ISO\/IEC 27001:2022, cuya certificaci\u00f3n ha [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-4410","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seguridad - Epika Comunicaci\u00f3n<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/epikacomunicacion.com\/en\/seguridad\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguridad - Epika Comunicaci\u00f3n\" \/>\n<meta property=\"og:description\" content=\"POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N Epika Comunicaci\u00f3n, S.L.U., en adelante EPIKA, considera que la informaci\u00f3n, en especial la relativa a clientes, y los distintos sistemas asociados son activos cr\u00edticos que deben ser protegidos adecuadamente para asegurar el correcto funcionamiento de la empresa, siempre adecuando dicha pol\u00edtica a la norma ISO\/IEC 27001:2022, cuya certificaci\u00f3n ha [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/epikacomunicacion.com\/en\/seguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Epika Comunicaci\u00f3n\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T16:54:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/epikacomunicacion.com\/wp-content\/uploads\/2023\/08\/about2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"574\" \/>\n\t<meta property=\"og:image:height\" content=\"782\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/epikacomunicacion.com\/seguridad\/\",\"url\":\"https:\/\/epikacomunicacion.com\/seguridad\/\",\"name\":\"Seguridad - Epika Comunicaci\u00f3n\",\"isPartOf\":{\"@id\":\"https:\/\/epikacomunicacion.com\/#website\"},\"datePublished\":\"2025-06-11T10:08:36+00:00\",\"dateModified\":\"2025-11-17T16:54:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/epikacomunicacion.com\/seguridad\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/epikacomunicacion.com\/seguridad\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/epikacomunicacion.com\/seguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/epikacomunicacion.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/epikacomunicacion.com\/#website\",\"url\":\"https:\/\/epikacomunicacion.com\/\",\"name\":\"Epika Comunicaci\u00f3n\",\"description\":\"Nuestro nombre es cl\u00e1sico, nuestro trabajo no. Consultor\u00eda estrat\u00e9gica 360. Comunicaci\u00f3n | Marketing digital | Producci\u00f3n audiovisual | Eventos.\",\"publisher\":{\"@id\":\"https:\/\/epikacomunicacion.com\/#organization\"},\"alternateName\":\"Epika\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/epikacomunicacion.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/epikacomunicacion.com\/#organization\",\"name\":\"Epika Comunicaci\u00f3n\",\"alternateName\":\"Epika\",\"url\":\"https:\/\/epikacomunicacion.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/epikacomunicacion.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/epikacomunicacion.com\/wp-content\/uploads\/2023\/08\/epika-8.png\",\"contentUrl\":\"https:\/\/epikacomunicacion.com\/wp-content\/uploads\/2023\/08\/epika-8.png\",\"width\":1081,\"height\":1080,\"caption\":\"Epika Comunicaci\u00f3n\"},\"image\":{\"@id\":\"https:\/\/epikacomunicacion.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/epikacomunicacion\/\",\"https:\/\/www.instagram.com\/epika_comunicacion\/?hl=es\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguridad - Epika Comunicaci\u00f3n","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/epikacomunicacion.com\/en\/seguridad\/","og_locale":"en_GB","og_type":"article","og_title":"Seguridad - Epika Comunicaci\u00f3n","og_description":"POL\u00cdTICA DE SEGURIDAD DE LA INFORMACI\u00d3N Epika Comunicaci\u00f3n, S.L.U., en adelante EPIKA, considera que la informaci\u00f3n, en especial la relativa a clientes, y los distintos sistemas asociados son activos cr\u00edticos que deben ser protegidos adecuadamente para asegurar el correcto funcionamiento de la empresa, siempre adecuando dicha pol\u00edtica a la norma ISO\/IEC 27001:2022, cuya certificaci\u00f3n ha [&hellip;]","og_url":"https:\/\/epikacomunicacion.com\/en\/seguridad\/","og_site_name":"Epika Comunicaci\u00f3n","article_modified_time":"2025-11-17T16:54:51+00:00","og_image":[{"width":574,"height":782,"url":"https:\/\/epikacomunicacion.com\/wp-content\/uploads\/2023\/08\/about2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/epikacomunicacion.com\/seguridad\/","url":"https:\/\/epikacomunicacion.com\/seguridad\/","name":"Seguridad - Epika Comunicaci\u00f3n","isPartOf":{"@id":"https:\/\/epikacomunicacion.com\/#website"},"datePublished":"2025-06-11T10:08:36+00:00","dateModified":"2025-11-17T16:54:51+00:00","breadcrumb":{"@id":"https:\/\/epikacomunicacion.com\/seguridad\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/epikacomunicacion.com\/seguridad\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/epikacomunicacion.com\/seguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/epikacomunicacion.com\/"},{"@type":"ListItem","position":2,"name":"Seguridad"}]},{"@type":"WebSite","@id":"https:\/\/epikacomunicacion.com\/#website","url":"https:\/\/epikacomunicacion.com\/","name":"Epika Comunicaci\u00f3n","description":"Nuestro nombre es cl\u00e1sico, nuestro trabajo no. Consultor\u00eda estrat\u00e9gica 360. Comunicaci\u00f3n | Marketing digital | Producci\u00f3n audiovisual | Eventos.","publisher":{"@id":"https:\/\/epikacomunicacion.com\/#organization"},"alternateName":"Epika","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/epikacomunicacion.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/epikacomunicacion.com\/#organization","name":"Epika Comunicaci\u00f3n","alternateName":"Epika","url":"https:\/\/epikacomunicacion.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/epikacomunicacion.com\/#\/schema\/logo\/image\/","url":"https:\/\/epikacomunicacion.com\/wp-content\/uploads\/2023\/08\/epika-8.png","contentUrl":"https:\/\/epikacomunicacion.com\/wp-content\/uploads\/2023\/08\/epika-8.png","width":1081,"height":1080,"caption":"Epika Comunicaci\u00f3n"},"image":{"@id":"https:\/\/epikacomunicacion.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/epikacomunicacion\/","https:\/\/www.instagram.com\/epika_comunicacion\/?hl=es"]}]}},"_links":{"self":[{"href":"https:\/\/epikacomunicacion.com\/en\/wp-json\/wp\/v2\/pages\/4410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epikacomunicacion.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/epikacomunicacion.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/epikacomunicacion.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/epikacomunicacion.com\/en\/wp-json\/wp\/v2\/comments?post=4410"}],"version-history":[{"count":10,"href":"https:\/\/epikacomunicacion.com\/en\/wp-json\/wp\/v2\/pages\/4410\/revisions"}],"predecessor-version":[{"id":4475,"href":"https:\/\/epikacomunicacion.com\/en\/wp-json\/wp\/v2\/pages\/4410\/revisions\/4475"}],"wp:attachment":[{"href":"https:\/\/epikacomunicacion.com\/en\/wp-json\/wp\/v2\/media?parent=4410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}