{"id":8402,"date":"2022-07-01T18:27:56","date_gmt":"2022-07-01T18:27:56","guid":{"rendered":"https:\/\/incm.pt\/site\/information-security-policy\/"},"modified":"2025-12-04T12:25:09","modified_gmt":"2025-12-04T12:25:09","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/incm.pt\/site\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;||10px||false|false&#8221; custom_padding_phone=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code module_class=&#8221;breadcrumb&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_margin_tablet=&#8221;||0px||false|false&#8221; custom_margin_phone=&#8221;||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;|0px|0px|0px|false|false&#8221; custom_padding_tablet=&#8221;|0px||0px|false|false&#8221; custom_padding_phone=&#8221;|0px||0px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_code][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Montserrat|700|||||||&#8221; header_text_color=&#8221;#333333&#8243; header_font_size=&#8221;45px&#8221; header_letter_spacing=&#8221;5px&#8221; width_last_edited=&#8221;off|desktop&#8221; max_width=&#8221;60%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;25px||5px||false|false&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; animation_style=&#8221;flip&#8221; animation_direction=&#8221;bottom&#8221; header_font_size_tablet=&#8221;35px&#8221; header_font_size_phone=&#8221;25px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; header_letter_spacing_tablet=&#8221;3px&#8221; header_letter_spacing_phone=&#8221;0px&#8221; header_letter_spacing_last_edited=&#8221;on|desktop&#8221; header_line_height_tablet=&#8221;&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; border_width_bottom=&#8221;5px&#8221; border_color_bottom=&#8221;#b5a216&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span>INFORMATION SECURITY POLICY<\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; custom_padding_tablet=&#8221;0px|||||&#8221; custom_padding_phone=&#8221;15px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; animation_style=&#8221;fade&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong> Introduction <\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The information managed by<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr>, its support processes, systems, applications, and networks are valuable assets to the organization and, in this context, information security must be a priority in order to ensure the continuity of the organization&#8217;s activity, minimizing risks and maximizing performance and service delivery.<\/p>\n<p>Information security should be applied in all phases of the information life cycle, ensuring that a high level of quality and security is maintained in a permanent and balanced way, preventing the materialization of inherent risks, to mitigate the potential damage caused by the exploitation of vulnerabilities and security incidents, and ensuring that the business operates as expected over time.<\/p>\n<p>It is<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> <\/span>understanding that information security is a fundamental assumption for the success of its services, being the responsibility of all, employees, suppliers, or other entities that have access to the information at each moment to act according to the rules defined and imposed by the policy.<\/p>\n<p>Information Security is supported by a management system, known as the Information Security Management System (ISMS), consisting of a set of policies and procedures that ensure the essential principles of information, availability, integrity, and confidentiality, in accordance with business requirements, relevant laws, and regulations.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong> Goal <\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>This policy aims to define the purpose, direction, principles, and fundamental rules of information security management, according to the characteristics and needs of the business of Imprensa Nacional &#8211; Casa da Moeda (<\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span>) and its stakeholders.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong> Scope\/Target Public <\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Applicable to the whole organization including all stakeholders, and entities that maintain any kind of commercial\/contractual relationship with<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> <\/span>(employees, customers, suppliers, service providers) that have access, usage right, or control over the information assets held by<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> <\/span>and\/or the resources associated to them.<\/p>\n<p>All stakeholders must know and act in accordance with this Policy and the other Information Security related documents, as applicable and appropriate.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong> Failure to Comply <\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>All covered stakeholders who deliberately violate this policy will be subject to sanctions and other actions, up to and including termination of the contract and\/or reporting to the police or judicial authorities situations that suggest the commission of a crime.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong> Information Security Policy <\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The Information Security Policy expresses the considerations of<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> <\/span>regarding information security on the following aspects:<\/p>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">A. Elementary aspects of Information Security:<\/span><br \/>\n<\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The management of information security and the systems that support it is carried out ensuring, through an approach based on risk management and continuous improvement, the confidentiality, integrity, and availability of information. In this sense, <abbr title=\"National Press - Mint\">INCM<\/abbr> commits itself to:<\/span><\/p>\n<ol>\n<li>To ensure the security of the information it holds title to, as well as all resources associated with it, whether procedural, technological, or human.<\/li>\n<li>Ensure the establishment and pursuit of the principles described in this policy, as well as its approval, publication, and communication to all relevant collaborators and external entities;<\/li>\n<li>Ensure the necessary resources for the operationalization of information security management processes and activities;<\/li>\n<li>Ensure the definition, implementation, and revision of the information security management strategy and ensure the correct alignment with the policies and strategic business objectives of<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr>;<\/li>\n<li>Ensure that the ISMS achieves its intended results;<\/li>\n<li>Promote, in a structured and systematic way, continuous improvement.<\/li>\n<\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">B. Information Classification and Handling:<\/span><br \/>\n<\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Defining an information security asset is any resource of value to the organization, these are classified according to their sensitivity to its attributes, namely confidentiality, integrity, and availability, in order to apply the appropriate controls to safeguard them.<\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">C. Use of mobile devices and remote access:<\/span><br \/>\n<\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Security measures are applied to the use of mobile devices to ensure the confidentiality, integrity, and availability of business information so that it can be accessed (locally or remotely) and\/or processed by these devices.<\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">D. Acceptable use of assets:<\/span><br \/>\n<\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The information assets owned by<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> <\/span>are used in a way to guarantee its protection, avoiding exposure to Information Security risks with the potential impact to compromise the business continuity of<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr>.<\/p>\n<p>The<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> <\/span>grants its employees and visitors the right to use their own equipment, as long as the internal guidelines are followed.<\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">E. Relationship with suppliers<\/span><br \/>\n<\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Suppliers are evaluated in order to guarantee contractual relationships with entities that contribute to obtaining access to materials and services that are suitable for<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr>&#8216;s business.<\/p>\n<p>The specifications drawn up by<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> <\/span>for awarding contracts for the supply of goods or services include aspects that guarantee Information Security, stipulating the supplier&#8217;s responsibilities and duties.<\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">F. Physical and logical access controls<\/span><br \/>\n<\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Physical and logical access controls are in place that allows the management of identities through user identification and authentication processes and, in turn, allow the implementation of restriction rules based on security criteria.<\/p>\n<p>The different profiles, privileges, and levels of physical and logical access are defined following the<span> <\/span><i>Principle of Least Privilege<\/i>, that is, by assigning the level of access strictly necessary for the user to perform the assigned functions and no more.<\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">G. Encryption<\/span><br \/>\n<\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><abbr title=\"National Press - Mint\">INCM<\/abbr><span> implements cryptographic mechanisms to protect logical information from non-authorized accesses.<\/span><\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">H. <b>Clean table and screen<\/b><\/span><br \/>\n<\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Information considered sensitive, in physical or digital format, is duly protected whenever it is not in use.<\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">I. <b>Backups<\/b><\/span><\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Backup copies are made with a defined periodicity in order to safeguard the information.<br \/>Employees and visitors are responsible for backing up the information contained on the equipment under their charge.<\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">J. <b>Information Transfer<\/b><\/span><\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Information is exchanged over approved communication channels following the security requirements defined according to your security classification.<\/span><\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">K. <b>Engineering principles and policy for developing secure information systems:<\/b><\/span><\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Principles of secure information system development are applied at all levels of the system architecture (business, data, applications, and technology) balancing the need for security with the need for accessibility\/functional efficiency. <\/span><\/p>\n<p><span>The principles are considered throughout the life cycle of information systems from an evolutionary perspective.<\/span><\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">L. <b>Information Security in Project Management<\/b><\/span><\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Information security is addressed in project management by identifying possible information security risks associated with the project to be implemented.<\/span><\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">M. <b>Risk Management and Incident Management and Business Continuity<\/b><\/span><\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Risks arising from various sources of risk to your information assets are identified, analyzed, quantified\/qualified.<\/span><\/p>\n<p><span>Events that call into question or have the potential to call into question Information Security commitments are treated as possible security incidents and are handled according to the internal Incident Management process.<\/span><\/p>\n<p><span>Continuity of Information Security is contemplated in business continuity, in such a way that it contemplates the loss of information resources by implementing preventive and recovery controls.<\/span><\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; custom_padding=&#8221;|||15px|false|false&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong><span style=\"color: #000000;\">N. <b>ISMS Profiles, Responsibilities and Authorities<\/b><\/span><\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; ol_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; ol_line_height_tablet=&#8221;1.7em&#8221; ol_line_height_phone=&#8221;1.7em&#8221; ol_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The roles, responsibilities, and authorities to enforce INCM&#8217;s commitments are defined by <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> to Information Security.<\/span><\/p>\n<ol><\/ol>\n<ol><\/ol>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong> Information Security Responsibilities <\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The Information Security Policy is the responsibility of the CISO &#8211;<span> <\/span><i>Chief Information Security Officer<\/i>, who is in charge of monitoring and evaluating the ISMS implementation, reporting to top management on its performance, and ensuring the system&#8217;s compliance with the Standard requirements.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong> Maintenance and communication of Information Security Policies <\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The Information Security Policy must be periodically reviewed in order to ensure that it continues to be adequate to<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> <\/span>and must be communicated to all stakeholders within the scope of their relationship with<span> <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong> Change Control <\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_code _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; overflow-x=&#8221;scroll&#8221; custom_margin=&#8221;||||false|false&#8221; custom_margin_tablet=&#8221;||15px||false|false&#8221; custom_margin_phone=&#8221;||15px||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<table><!-- [et_pb_line_break_holder] -->  <\/p>\n<tr style=\"border-top:1px solid #eeeeee\"><!-- [et_pb_line_break_holder] -->    <\/p>\n<th style=\"border: 1px solid #8f8011; width:calc(100%\/6); background-color:#b5a216;\"><pee style=\"text-align:center; color:#ffffff;\" class=\"table-text\">REVISION NO.  <\/pee><\/th>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<th style=\"border: 1px solid #8f8011; width:calc(100%\/6); background-color:#b5a216;\"><pee style=\"text-align:center; color:#ffffff;\" class=\"table-text\">DATE<\/pee><\/th>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<th style=\"border: 1px solid #8f8011; width:calc(100%\/6); background-color:#b5a216;\"><pee style=\"text-align:center; color:#ffffff;\" class=\"table-text\">MOTIVE<\/pee><\/th>\n<p><!-- [et_pb_line_break_holder] -->  <\/tr>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<tr><!-- [et_pb_line_break_holder] -->    <\/p>\n<td><pee style=\"text-align:center;\" class=\"table-text\">0<\/pee><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<td><pee style=\"text-align:center;\" class=\"table-text\">12\/11\/2020<\/pee><!-- [et_pb_line_break_holder] -->    <\/p>\n<td><pee style=\"text-align:center;\" class=\"table-text\">Creation of the External Information Security Policy<\/pee><!-- [et_pb_line_break_holder] -->  <\/tr>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<tr><!-- [et_pb_line_break_holder] -->    <\/p>\n<td><pee style=\"text-align:center;\" class=\"table-text\">1<\/pee><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<td><pee style=\"text-align:center;\" class=\"table-text\">17\/05\/2021<\/pee><!-- [et_pb_line_break_holder] -->    <\/p>\n<td><pee style=\"text-align:center;\" class=\"table-text\">Change Control Introduction<\/pee><!-- [et_pb_line_break_holder] -->  <\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/table>\n<p>[\/et_pb_code][et_pb_code disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_last_edited=&#8221;off|desktop&#8221; custom_margin_tablet=&#8221;-10px||||false|false&#8221; custom_margin_phone=&#8221;-15px||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<table style=\"width:100px;border:none;margin-left:auto;margin-right:auto;\"><!-- [et_pb_line_break_holder] -->  <\/p>\n<tr style=\"text-align:center;\"><!-- [et_pb_line_break_holder] -->    <\/p>\n<th style=\"border:none;padding:0px;\"><i style=\"font-size:15px;color:#000000\" class=\"fa-solid fa-angle-left\"><\/i><\/th>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<td style=\"border:none;padding:0px;\"><i style=\"font-size: 25px;color:#b5a216\" class=\"fa-solid fa-hand-pointer\"><\/i><\/td>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<td style=\"border:none;padding:0px;\"><i style=\"font-size: 15px;color:#000000\" class=\"fa-solid fa-angle-right\"><\/i><\/td>\n<p><!-- [et_pb_line_break_holder] -->  <\/tr>\n<p><!-- [et_pb_line_break_holder] --><\/table>\n<p>[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#af9828&#8243; text_font_size=&#8221;22px&#8221; text_letter_spacing=&#8221;3px&#8221; text_line_height=&#8221;1.5em&#8221; header_font_size=&#8221;32px&#8221; header_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;32px&#8221; header_2_line_height=&#8221;1.4em&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;25px&#8221; header_font_size_phone=&#8221;20px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.2em&#8221; header_line_height_last_edited=&#8221;on|tablet&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_2_line_height_tablet=&#8221;1.3em&#8221; header_2_line_height_phone=&#8221;1.2em&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"color: #c2aa33;\"><strong> Talk to us <\/strong><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Merriweather||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;22px&#8221; text_line_height=&#8221;1.5em&#8221; link_font=&#8221;|700|||||||&#8221; link_text_color=&#8221;#c2aa33&#8243; ul_line_height=&#8221;1.7em&#8221; animation_style=&#8221;fade&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; ul_line_height_tablet=&#8221;1.7em&#8221; ul_line_height_phone=&#8221;1.7em&#8221; ul_line_height_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>You may contact <\/span><abbr title=\"National Press - Mint\">INCM<\/abbr><span> for all matters related to this policy through the following email address: <\/span><a href=\"mailto:ciso@incm.pt\">ciso@incm.pt<\/a><span> or send your request by letter to the address Avenida de Ant\u00f3nio Jos\u00e9 de Almeida, Edif\u00edcio Casa da Moeda, 1000-042 Lisboa.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>INFORMATION SECURITY POLICY Introduction The information managed by INCM, its support processes, systems, applications, and networks are valuable assets to the organization and, in this context, information security must be a priority in order to ensure the continuity of the organization&#8217;s activity, minimizing risks and maximizing performance and service delivery. Information security should be applied [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2109,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-8402","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/incm.pt\/site\/en\/wp-json\/wp\/v2\/pages\/8402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/incm.pt\/site\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/incm.pt\/site\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/incm.pt\/site\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/incm.pt\/site\/en\/wp-json\/wp\/v2\/comments?post=8402"}],"version-history":[{"count":1,"href":"https:\/\/incm.pt\/site\/en\/wp-json\/wp\/v2\/pages\/8402\/revisions"}],"predecessor-version":[{"id":75575,"href":"https:\/\/incm.pt\/site\/en\/wp-json\/wp\/v2\/pages\/8402\/revisions\/75575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/incm.pt\/site\/en\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/incm.pt\/site\/en\/wp-json\/wp\/v2\/media?parent=8402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}