{"id":2893,"date":"2025-04-14T09:37:01","date_gmt":"2025-04-14T07:37:01","guid":{"rendered":"https:\/\/www.rovimatica.com\/?page_id=2893"},"modified":"2026-04-07T09:33:41","modified_gmt":"2026-04-07T07:33:41","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/www.rovimatica.com\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"\n<div    class='bg-bold-purple relative overflow-hidden  min-h-dvh flex items-center\r\n\r\n'    >\n    \n\n\n            <h3>Simple image<\/h3>\n    \n\n\n\n<div    class='absolute inset-0 w-full h-full bg-bold-purple\/30 hidden'    >\n    \n<\/div>\n\n\n<div    class='relative container flex items-center justify-center px-30 pb-60 pt-100 w-full h-full'    >\n    \n\n<h2 class=\"wp-block-heading text-4xl xl:text-6xl text-soft-white text-center\" data-aos=\"splitInUp\" data-aos-split=\"words\">Information Security Policy<\/h2>\n\n\n<\/div>\n\n<\/div>\n\n\n<div    class='container mx-auto py-100 px-8 flex flex-col gap-12 items-start\r\n\r\n'    >\n    \n\n<h1 class=\"wp-block-heading\">Introduction<\/h1>\n\n\n\n<p>ROVIM\u00c1TICA\u2019s Security Policy sets out the principles and objectives relating to information security, the implementation of which enables our company to fulfil its mission of providing services relating to the design, implementation and maintenance of solutions in the fields of automation, control, robotics, mechatronics, vision systems and artificial intelligence.<\/p>\n\n\n\n<p>By drawing up, communicating and maintaining this policy, the Management of ROVIM\u00c1TICA demonstrates its commitment to protecting the confidentiality of the information it handles in the provision of its services, ensuring its integrity throughout all data processing operations it carries out, as well as the availability of the information systems involved in such processing.<\/p>\n\n\n\n<p>To this end, the Management has defined and implemented an Information Security Management System that enables the company to ensure that its information systems and the information created, collected, stored and processed comply with:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Safety in human resources management, before, during and after employment.<\/li>\n\n\n\n<li>Proper asset management, which involves classifying information and handling data storage media, as well as establishing robust logical access controls for systems and applications, and managing user permissions and privileges.<\/li>\n\n\n\n<li>The protection of facilities and the physical environment through the design of safe work areas and the security of equipment.<\/li>\n\n\n\n<li>Ensuring operational security through protection against malicious software, performing backups, maintaining logs and monitoring them, and monitoring software in use.<\/li>\n\n\n\n<li>The management of technical vulnerabilities and the selection of appropriate techniques for system auditing.<\/li>\n\n\n\n<li>Communications security: protecting networks and the exchange of information.<\/li>\n\n\n\n<li>El aseguramiento de la seguridad en la adquisici\u00f3n y mantenimiento de los sistemas de informaci\u00f3n, limitando y gestionando el cambio.<\/li>\n\n\n\n<li>Ensuring security in the procurement and maintenance of information systems, by limiting and managing change.<\/li>\n\n\n\n<li>Effective management of security incidents, establishing appropriate channels for reporting, responding to and learning from them in a timely manner.<\/li>\n\n\n\n<li>The implementation of a business continuity plan to safeguard the availability of services during a crisis or disaster.<\/li>\n\n\n\n<li>Identifying and complying with applicable regulations, with a particular focus on intellectual property and the protection of personal data<\/li>\n\n\n\n<li>The regular review and continuous improvement of our information security management system to ensure compliance with and the effectiveness of these requirements<\/li>\n<\/ul>\n\n\n\n<p>All staff within the organisation are required to comply with this policy; to this end, management provides the necessary means and sufficient resources to ensure compliance, and undertakes to communicate the policy and keep it accessible to all stakeholders.<\/p>\n\n\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-2893","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Policy - Rovim\u00e1tica<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rovimatica.com\/en\/information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy - Rovim\u00e1tica\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rovimatica.com\/en\/information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Rovim\u00e1tica\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T07:33:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rovimatica.com\/en\/information-security-policy\/\",\"url\":\"https:\/\/www.rovimatica.com\/en\/information-security-policy\/\",\"name\":\"Information Security Policy - Rovim\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\/\/www.rovimatica.com\/#website\"},\"datePublished\":\"2025-04-14T07:37:01+00:00\",\"dateModified\":\"2026-04-07T07:33:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rovimatica.com\/en\/information-security-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rovimatica.com\/en\/information-security-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rovimatica.com\/en\/information-security-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.rovimatica.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rovimatica.com\/#website\",\"url\":\"https:\/\/www.rovimatica.com\/\",\"name\":\"Rovim\u00e1tica\",\"description\":\"Automatizaci\u00f3n industrial, visi\u00f3n artificial, veh\u00edculos industriales\",\"publisher\":{\"@id\":\"https:\/\/www.rovimatica.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rovimatica.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rovimatica.com\/#organization\",\"name\":\"Rovim\u00e1tica\",\"url\":\"https:\/\/www.rovimatica.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rovimatica.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rovimatica.com\/wp-content\/uploads\/2025\/05\/logo-blue-1.svg\",\"contentUrl\":\"https:\/\/www.rovimatica.com\/wp-content\/uploads\/2025\/05\/logo-blue-1.svg\",\"width\":254,\"height\":53,\"caption\":\"Rovim\u00e1tica\"},\"image\":{\"@id\":\"https:\/\/www.rovimatica.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy - Rovim\u00e1tica","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rovimatica.com\/en\/information-security-policy\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Policy - Rovim\u00e1tica","og_url":"https:\/\/www.rovimatica.com\/en\/information-security-policy\/","og_site_name":"Rovim\u00e1tica","article_modified_time":"2026-04-07T07:33:41+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rovimatica.com\/en\/information-security-policy\/","url":"https:\/\/www.rovimatica.com\/en\/information-security-policy\/","name":"Information Security Policy - Rovim\u00e1tica","isPartOf":{"@id":"https:\/\/www.rovimatica.com\/#website"},"datePublished":"2025-04-14T07:37:01+00:00","dateModified":"2026-04-07T07:33:41+00:00","breadcrumb":{"@id":"https:\/\/www.rovimatica.com\/en\/information-security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rovimatica.com\/en\/information-security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rovimatica.com\/en\/information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.rovimatica.com\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.rovimatica.com\/#website","url":"https:\/\/www.rovimatica.com\/","name":"Rovim\u00e1tica","description":"Automatizaci\u00f3n industrial, visi\u00f3n artificial, veh\u00edculos industriales","publisher":{"@id":"https:\/\/www.rovimatica.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rovimatica.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rovimatica.com\/#organization","name":"Rovim\u00e1tica","url":"https:\/\/www.rovimatica.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rovimatica.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rovimatica.com\/wp-content\/uploads\/2025\/05\/logo-blue-1.svg","contentUrl":"https:\/\/www.rovimatica.com\/wp-content\/uploads\/2025\/05\/logo-blue-1.svg","width":254,"height":53,"caption":"Rovim\u00e1tica"},"image":{"@id":"https:\/\/www.rovimatica.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.rovimatica.com\/en\/wp-json\/wp\/v2\/pages\/2893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rovimatica.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rovimatica.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rovimatica.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rovimatica.com\/en\/wp-json\/wp\/v2\/comments?post=2893"}],"version-history":[{"count":2,"href":"https:\/\/www.rovimatica.com\/en\/wp-json\/wp\/v2\/pages\/2893\/revisions"}],"predecessor-version":[{"id":2919,"href":"https:\/\/www.rovimatica.com\/en\/wp-json\/wp\/v2\/pages\/2893\/revisions\/2919"}],"wp:attachment":[{"href":"https:\/\/www.rovimatica.com\/en\/wp-json\/wp\/v2\/media?parent=2893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}