Políticas de Seguridad

El presente Política de Privacidad establece los términos en que Blackdog usa y protege la información que es proporcionada por sus usuarios al momento de utilizar su sitio web. Esta compañía está comprometida con la seguridad de los datos de sus usuarios. Cuando le pedimos llenar los campos de información personal con la cual usted pueda ser identificado, lo hacemos asegurando que sólo se empleará de acuerdo con los términos de este documento. Sin embargo, esta Política de Privacidad puede cambiar con el tiempo o ser actualizada por lo que le recomendamos y enfatizamos revisar continuamente esta página para asegurarse que está de acuerdo con dichos cambios.
1. Secure Access to Information
  • All employees must have access only to the information necessary to carry out their job responsibilities.
  • Strong, unique passwords should be used to access systems and accounts, and they should be changed regularly.
  • Se debe aplicar el principio de «mínimos privilegios», garantizando que los empleados solo tengan acceso a la información necesaria para realizar sus funciones.
2. Protection of Personal Data
  • All personal data must be processed in accordance with applicable data protection laws, such as the General Data Protection Regulation (GDPR).
  • Explicit consent must be obtained from individuals before collecting, processing or storing their personal data.
  • Appropriate technical and organizational measures must be implemented to ensure the security of personal data, including encryption, pseudonymization and access control.
3. Network and Systems Security
  • Up-to-date firewalls and antivirus software should be used to protect the network from external threats.
  • Security patches and software updates should be applied regularly to mitigate vulnerabilities.
  • An intrusion detection system should be implemented to monitor and respond to potential unauthorized access attempts.
4. Data Backup and Recovery
  • All critical data should be backed up regularly and stored in secure, off-site locations.
  • Data recovery capability should be tested regularly to ensure that systems and data can be restored in the event of an outage.
5. Acceptable Use Policy
  • A clear acceptable use policy should be established that defines permitted and prohibited activities on company systems.
  • Employees should be trained on the acceptable use policy and the consequences of violating it.
6. Security Incident Management
  • A security incident response plan must be established to effectively and quickly handle any security breach.
  • An incident response team should be designated with defined roles and responsibilities.
  • All security incidents must be documented and reported to facilitate continuous improvement of security policies and procedures.
7. Cancellation of Services
  • Regular information security training should be provided to all employees to increase awareness of security threats and best practices.
  • Simulated phishing tests should be conducted to assess employees' susceptibility to social engineering attacks.
8. Legal and Regulatory Compliance
  • Compliance with all applicable information security laws and regulations must be maintained, including GDPR and any other relevant sector regulations.
  • Information security policies should be regularly reviewed and updated to ensure ongoing compliance with legal and regulatory requirements.
Blackdog se reserva el derecho de cambiar los términos de la presente Política de Privacidad en cualquier momento.

Blackdog Consulting S.L.U. 

Impact Hub Alameda, Calle de la Alameda 22
28014, Madrid

+34 691 806 505 

hello@blackdog.consulting 

Fill out our form to start your Consulting

en_USEnglish