INOXPA CHINA

Shanghai 201400

China

Information Security Policy


1. Purpose

The purpose of this policy is to provide the directives or guidelines to be followed in order to protect the Organization’s information from a wide range of threats.

2. Scope

The scope of the Information Security Policy coincides with the scope of the ISMS as established in the document “I-TIC-001 Context of the Organization”.

3. Definitions and Acronyms

For the correct interpretation of this Policy, the following definitions are included:

  • Information: Data that has meaning, in any format or medium. It refers to all communication or representation of knowledge.
  • Information System: A set of related and organized resources for processing information, according to specific procedures, both computerized and manual.

4. Specifications

4.1. Objectives of the Information Security Policy

To ensure that clients and service users have access to information with the quality and service level required for agreed performance, and to prevent loss or alteration of information and unauthorized access.

A framework is established for achieving the organization’s information security objectives. These objectives will be achieved through a series of organizational measures and clearly defined rules.

This Security Policy will be maintained, updated, and adapted to the organization’s purposes.

The principles to be respected, based on the basic dimensions of security, are:

  • Confidentiality: Only those authorized and properly identified may access the information managed by INOXPA, at the appropriate time and through the enabled means.
  • Integrity: Ensures the validity, accuracy, and completeness of the information managed by INOXPA, allowing it to be modified only by those authorized.
  • Availability: Information managed by INOXPA is accessible and usable by authorized and identified clients and users at all times, with its persistence guaranteed against foreseeable events.

Additionally, since any Information Security Management System must comply with current legislation, the following principle applies:

  • Legality: Refers to compliance with laws, regulations, or provisions applicable to INOXPA, especially regarding personal data protection.

4.2. Risk Management

Information Security management at INOXPA is risk-based, in accordance with the international standard ISO/IEC 27001:2022.

Processes will be periodically generated to identify potential risks that may affect the security of the information of the services provided. These risks will then be analyzed and evaluated to take appropriate treatment actions through measures or controls.

This process is cyclical and must be carried out periodically, at least once a year. Each identified risk will be assigned an owner, and multiple responsibilities may fall on the same person or committee.

4.3. Roles, Responsibilities, and Authorities

Described in the document “N-TIC-007 Roles, Responsibilities, and Authorities”.

4.4. ISMS Objectives

The INOXPA ISMS must ensure:

  • Development of policies, regulations, procedures, and operational guides to support the information security policy.
  • Identification of information that must be protected.
  • Establishment and maintenance of risk management aligned with the ISMS policy and INOXPA’s strategy.
  • Establishment of a methodology for risk assessment and treatment.
  • Establishment of criteria to measure ISMS compliance.
  • Correction of non-conformities through corrective actions.
  • Training and awareness of personnel on information security.
  • Informing all personnel of their obligation to comply with the information security policy.
  • Allocation of necessary resources to manage the ISMS.
  • Identification and compliance with all legal, regulatory, and contractual requirements.
  • Identification and analysis of information security implications regarding business requirements.
  • Measurement of the maturity level of the information security management system.
  • Continuous improvement of the ISMS.

4.5. Organization and Responsibilities

  • The General Management of INOXPA is responsible for approving this policy.
  • The Information Security Management Committee is responsible for reviewing this policy.
  • The ISMS Security Officer is responsible for maintaining this policy.

4.6. Policy Implementation

INOXPA has developed this document containing the General Information Security Policy, which has been approved by General Management and communicated to all company personnel.

4.7. Training and Awareness

The ISMS Security Officer must ensure that all personnel involved in the ISMS are aware of this policy, its objectives, and processes through dissemination, training, and awareness actions.

The ISMS Communication Officer must ensure the distribution of documents applicable to each level, according to the different roles defined in the company.

4.8. Audit

The General Management of INOXPA must ensure and verify, through internal and external audits, the degree of compliance with this Policy and that it is properly operated and implemented, being responsible for the implementation of corrective measures to maintain continuous improvement.

4.9. Validity and Update

This policy is effective from the moment of its publication and is reviewed at least once a year.

5. References

  • I-TIC-001 – Context of the Organization
  • N-TIC-007 – Roles, Responsibilities, and Authorities

6. Sanctions

Failure to comply with the Information Security Policy and other related regulations and procedures will result in sanctions, depending on the severity and nature of the non-compliance, in accordance with current labor legislation.

7. Ratification

All signatories below fully accept the content of this Policy and commit to applying it in their respective areas to ensure the proper functioning of the Information Security Management System.

ㅤㅤㅤㅤㅤ

Banyoles, May 14, 2024

ㅤㅤㅤㅤㅤ

General Management

ISMS Security Officer

ㅤㅤㅤㅤㅤ

Cookies政策

本网站使用 cookie. 我们使用 Cookie 来制作贴合用户需求的内容与广告、提供社交媒体功能以及分析我们的流量。我们还会与社交媒体、广告和分析合作伙伴分享您对我们网站的使用情况,这些合作伙伴可能会将此类信息与您提供给他们或他们在您使用其服务的过程中收集的其他信息相结合。但是,阻止某些类型的Cookie可能会影响您在网站上的体验以及我们可以提供的服务。 Cookies政策页面

拒绝 接受所有
偏好设置
必要 (2)
偏好 (0)
统计 (7)
营销学 (11)
关于饼干

必要的cookie能够通过启用诸如网页导航和访问网站的安全领域等基本功能以使网站可用。若没有这些cookie,网站将无法恰当运行。

偏好cookie能够使网站记住更改网站行为或外观的信息,就好比您的首选语言或所在地区一样。

统计cookie能够通过收集和匿名报告信息帮助网站拥有者了解访客与网站互动的方式。

营销cookie用于对网站上的访客进行追踪。其目的是为了显示对个人用户来说相关及有吸引力的广告,因此,对于发布人和第三方广告商来说更为宝贵。

名称 提供者 目的 到期 类型
cc_cookie_accept www.inoxpa.cn 存储当前域的用户的Cookie同意状态 1 天 HTTP
PHPSESSID www.inoxpa.cn 跨页面请求保留用户会话状态。 届会 HTTP
collect Google 用于将有关访问者设备和行为的数据发送到Google Analytics(分析)。跨设备和营销渠道跟踪访客。 届会 像素点
_ga Google 注册一个唯一的ID,该ID用于生成有关访问者如何使用网站的统计数据。 2年 HTTP
_ga_# www.inoxpa.cn 由Google Analytics(分析)用来收集有关用户访问该网站的次数以及第一次和最近一次访问的日期的数据。 2年 HTTP
_gat_ Google 由Google Analytics(分析)用来限制请求率 1天 HTTP
_gid Google 注册一个唯一的ID,该ID用于生成有关访问者如何使用网站的统计数据。 1天 HTTP
fr Facebook 注册一个唯一的ID,该ID用于生成有关访问者如何使用网站的统计数据。 3个月 HTTP
_fbp Facebook 注册一个唯一的ID,该ID用于生成有关访问者如何使用网站的统计数据。 3个月 HTTP
IDE Google 由Google DoubleClick用来在查看或点击广告客户的广告之一后注册和报告网站用户的行为,目的是衡量广告的效果并向用户展示目标广告。 1 天 HTTP
ads/ga-audiences Google Google AdWords使用此工具重新吸引可能根据访问者在各个网站上的在线行为而转化为客户的访问者。 届会 像素点
VISITOR_INFO1_LIVE YouTube 尝试估算包含集成YouTube视频的页面上用户的带宽 179天 HTTP
YSC YouTube 注册一个唯一ID,以统计用户观看过YouTube的哪些视频。 届会 HTTP
yt-remote-cast-installed YouTube 使用嵌入式YouTube视频存储用户的视频播放器首选项。 届会 HTML
yt-remote-connected-devices YouTube 使用嵌入式YouTube视频存储用户的视频播放器首选项。 持久的 HTML
yt-remote-device-id YouTube 使用嵌入式YouTube视频存储用户的视频播放器首选项。 持久的 HTML
yt-remote-fast-check-period YouTube 使用嵌入式YouTube视频存储用户的视频播放器首选项。 届会 HTML
yt-remote-session-app YouTube 使用嵌入式YouTube视频存储用户的视频播放器首选项。 届会 HTML
yt-remote-session-app YouTube 使用嵌入式YouTube视频存储用户的视频播放器首选项。 届会 HTML
yt-remote-session-name YouTube 使用嵌入式YouTube视频存储用户的视频播放器首选项。 届会 HTML
Cookies是小型文本文件,网站可以使用它们来提高用户的体验效率。法律规定,如果对本网站的运营完全必要,我们可以将Cookie存储在您的设备上。对于所有其他类型的Cookie,我们需要您的许可。本网站使用不同类型的cookie。一些Cookie是由出现在我们页面上的第三方服务放置的。您可以随时从我们网站上的Cookie声明中更改或撤回您的同意。在我们的隐私权政策中了解有关我们是谁,如何与我们联系以及我们如何处理个人数据的更多信息。请说明您的同意书ID和您就同意书与我们联系时的日期。