{"id":9461,"date":"2020-07-13T14:22:16","date_gmt":"2020-07-13T12:22:16","guid":{"rendered":"https:\/\/www.topconsult.it\/security-policy\/"},"modified":"2023-02-23T15:39:02","modified_gmt":"2023-02-23T14:39:02","slug":"security-policy","status":"publish","type":"page","link":"https:\/\/www.topconsult.it\/en\/security-policy","title":{"rendered":"Security policy (OK)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"9461\" class=\"elementor elementor-9461 elementor-9186\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b74afbb testata-bassa e-flex e-con-boxed e-con e-parent\" data-id=\"b74afbb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\n\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\n\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73e16df e-con-full e-flex e-con e-parent\" data-id=\"73e16df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b282b9 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-heading\" data-id=\"0b282b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Management System Policy for Information Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b10f7c3 e-flex e-con-boxed e-con e-parent\" data-id=\"b10f7c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41335ca elementor-widget elementor-widget-heading\" data-id=\"41335ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Top Consult considers information security a strategic element for its activities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7442383d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7442383d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-593cc359\" data-id=\"593cc359\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-144a1c91 elementor-widget elementor-widget-text-editor\" data-id=\"144a1c91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>The organization aims to preserving its own interests and those of its Customers, paying particular attention to the aspects of:<\/strong><\/p><ul style=\"list-style-type: square;\"><li>Legal requirements<\/li><li>Service level<\/li><li>Business continuity<\/li><li>Confidentiality, integrity and availability of information<\/li><\/ul><p><\/p><p><strong>To this end, Top Consult aims to achieve information security by:<\/strong><\/p><ul><li>using good practices to protect the organization\u2019s information resources from threats to the security of internal or external information, either intentional or accidental<\/li><li>aligning information security management with the organization\u2019s strategic risk management context<\/li><li>setting information security objectives and establishing direction and principles for action<\/li><li>establishing criteria for risk assessment and risk acceptance<\/li><li>controlling access to information resources based on business and security needs<\/li><li>protecting information and physical media in transit<\/li><li>protecting the information associated with the interconnection of corporate information systems<\/li><li>applying guarantees for sharing information<\/li><li>observing the clean desk policy for documents and removable storage media<\/li><li>observing the clean screen policy for information processing services<\/li><li>implementing appropriate security measures for mobile computing and communications<\/li><li>using appropriate cryptographic controls to protect information<\/li><li>ensuring protection, durability and correct use of cryptographic keys throughout their life cycle<\/li><li>establishing rules for the development of software and systems and the application of these rules to developments within the organization<\/li><li>ensuring the protection of the organization\u2019s assets that are accessible by suppliers<\/li><li>prohibiting the use of unauthorized software and respecting intellectual property rights laws<\/li><li>protecting organizational and privacy data<\/li><li>preparing backup copies of information, software and system images and regularly testing them<\/li><li>keeping records for an appropriate period before disposing of them carefully<\/li><li>applying disciplinary actions and discouraging improper use of information services by staff<\/li><li>respecting the applicable information security requirements, including the requirements set out by ISO \/ IEC 27001: 2013<\/li><li>reviewing the effectiveness of the ISMS at regular intervals<\/li><li>continuously improving the ISMS.<\/li><\/ul><p>The Information Security Management System ensures that business continuity management, backup procedures, malware protection, access to systems and information management and incident management are effectively implemented and adequately supported by specific and documented policies and procedures.<\/p><p>The information security requirements are continuously aligned with the strategic business objectives of the company and ensure that the information is shared and usable while maintaining the risk that this entails at a still acceptable level.<\/p><p>The Management supports information security through a clear direction, an outstanding commitment, explicit assignments and recognition of responsibilities.<\/p><p>All staff contribute, each with their own competence and professionalism, to the effectiveness of the Information Security Management System and its compliance with this policy.<\/p><p>The Information Security Management System is subject to systematic review and improvement.<\/p><p><strong>Pier Luigi Zaffagnini CEO<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Management System Policy for Information Security Top Consult considers information security a strategic element for its activities The organization aims to preserving its own interests and those of its Customers, paying particular attention to the aspects of: Legal requirements Service level Business continuity Confidentiality, integrity and availability of information To this end, Top Consult aims&hellip;&nbsp;<a href=\"https:\/\/www.topconsult.it\/en\/security-policy\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Security policy (OK)<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-pagebuilder-full-width.php","meta":{"reading_time":0,"inline_featured_image":false,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-9461","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top Consult&#039;s Security policy<\/title>\n<meta name=\"description\" content=\"Discover Top Consult Information Security Management System Policy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topconsult.it\/en\/security-policy\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Consult&#039;s Security policy\" \/>\n<meta property=\"og:description\" content=\"Discover Top Consult Information Security Management System Policy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topconsult.it\/en\/security-policy\" \/>\n<meta property=\"og:site_name\" content=\"Top Consult\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-23T14:39:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Consult's Security policy","description":"Discover Top Consult Information Security Management System Policy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topconsult.it\/en\/security-policy","og_locale":"en_US","og_type":"article","og_title":"Top Consult's Security policy","og_description":"Discover Top Consult Information Security Management System Policy","og_url":"https:\/\/www.topconsult.it\/en\/security-policy","og_site_name":"Top Consult","article_modified_time":"2023-02-23T14:39:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.topconsult.it\/en\/security-policy","url":"https:\/\/www.topconsult.it\/en\/security-policy","name":"Top Consult's Security policy","isPartOf":{"@id":"https:\/\/www.topconsult.it\/en#website"},"datePublished":"2020-07-13T12:22:16+00:00","dateModified":"2023-02-23T14:39:02+00:00","description":"Discover Top Consult Information Security Management System Policy","breadcrumb":{"@id":"https:\/\/www.topconsult.it\/en\/security-policy#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topconsult.it\/en\/security-policy"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.topconsult.it\/en\/security-policy#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topconsult.it\/en"},{"@type":"ListItem","position":2,"name":"Security policy (OK)"}]},{"@type":"WebSite","@id":"https:\/\/www.topconsult.it\/en#website","url":"https:\/\/www.topconsult.it\/en","name":"Top Consult","description":"Avanti Veloce","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topconsult.it\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.topconsult.it\/en\/wp-json\/wp\/v2\/pages\/9461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topconsult.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.topconsult.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.topconsult.it\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topconsult.it\/en\/wp-json\/wp\/v2\/comments?post=9461"}],"version-history":[{"count":10,"href":"https:\/\/www.topconsult.it\/en\/wp-json\/wp\/v2\/pages\/9461\/revisions"}],"predecessor-version":[{"id":15244,"href":"https:\/\/www.topconsult.it\/en\/wp-json\/wp\/v2\/pages\/9461\/revisions\/15244"}],"wp:attachment":[{"href":"https:\/\/www.topconsult.it\/en\/wp-json\/wp\/v2\/media?parent=9461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}