{"id":23596,"date":"2026-03-05T09:47:05","date_gmt":"2026-03-05T08:47:05","guid":{"rendered":"https:\/\/www.icr-evolution.com\/?page_id=23596"},"modified":"2026-03-05T09:50:25","modified_gmt":"2026-03-05T08:50:25","slug":"security-policy","status":"publish","type":"page","link":"https:\/\/www.icr-evolution.com\/en\/security-policy\/","title":{"rendered":"Security policy"},"content":{"rendered":"<h3 id=\"security-policy\"><strong>SECURITY POLICY<\/strong><\/h3>\n<p data-start=\"6515\" data-end=\"6695\">TRUEITSYSTEMS S.L manages its information systems <strong data-start=\"6565\" data-end=\"6596\">in line with best practices<\/strong> and in accordance with <strong data-start=\"6620\" data-end=\"6638\">ISO 27001:2022<\/strong>. The Company adopts the following security principles:<\/p>\n<ul data-start=\"6697\" data-end=\"7574\">\n<li data-start=\"6697\" data-end=\"6818\"><strong data-start=\"6699\" data-end=\"6725\">Regulatory Compliance:<\/strong> All information systems comply with applicable legal and regulatory security requirements.<\/li>\n<li data-start=\"6819\" data-end=\"6961\"><strong data-start=\"6821\" data-end=\"6841\">Risk Management:<\/strong> Risks are minimised to acceptable levels while maintaining a balance between security controls and information needs.<\/li>\n<li data-start=\"6962\" data-end=\"7055\"><strong data-start=\"6964\" data-end=\"6991\">Awareness and Training:<\/strong> Employees receive security training and awareness programmes.<\/li>\n<li data-start=\"7056\" data-end=\"7313\"><strong data-start=\"7058\" data-end=\"7107\">Confidentiality, Integrity, and Availability:<\/strong>\n<ul data-start=\"7112\" data-end=\"7313\">\n<li data-start=\"7112\" data-end=\"7178\">Ensuring that only <strong data-start=\"7133\" data-end=\"7147\">authorised<\/strong> individuals can access data.<\/li>\n<li data-start=\"7181\" data-end=\"7243\">Maintaining the <strong data-start=\"7199\" data-end=\"7211\">accuracy<\/strong> of information and processes.<\/li>\n<li data-start=\"7246\" data-end=\"7313\">Guaranteeing <strong data-start=\"7261\" data-end=\"7284\">business continuity<\/strong> through contingency plans.<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"7314\" data-end=\"7385\"><strong data-start=\"7316\" data-end=\"7335\">Accountability:<\/strong> All employees must adhere to security policies.<\/li>\n<li data-start=\"7386\" data-end=\"7475\"><strong data-start=\"7388\" data-end=\"7415\">Continuous Improvement:<\/strong> Security controls are periodically reviewed and enhanced.<\/li>\n<li data-start=\"7476\" data-end=\"7574\"><strong data-start=\"7478\" data-end=\"7502\">Incident Management:<\/strong> A response plan is in place to address security breaches effectively.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SECURITY POLICY TRUEITSYSTEMS S.L manages its information systems in line with best practices and in accordance with ISO 27001:2022. The Company adopts the following security principles: Regulatory Compliance: All information systems comply with applicable legal and regulatory security requirements. Risk Management: Risks are minimised to acceptable levels while maintaining a balance between security controls and [&hellip;]<\/p>\n","protected":false},"author":100017,"featured_media":0,"parent":0,"menu_order":99,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-23596","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security policy - ICR Evolution - Software para Call Center Omnicanal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.icr-evolution.com\/en\/security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security policy - ICR Evolution - Software para Call Center Omnicanal\" \/>\n<meta property=\"og:description\" content=\"SECURITY POLICY TRUEITSYSTEMS S.L manages its information systems in line with best practices and in accordance with ISO 27001:2022. The Company adopts the following security principles: Regulatory Compliance: All information systems comply with applicable legal and regulatory security requirements. Risk Management: Risks are minimised to acceptable levels while maintaining a balance between security controls and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.icr-evolution.com\/en\/security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"ICR Evolution\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T08:50:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/security-policy\\\/\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/security-policy\\\/\",\"name\":\"Security policy - ICR Evolution - Software para Call Center Omnicanal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#website\"},\"datePublished\":\"2026-03-05T08:47:05+00:00\",\"dateModified\":\"2026-03-05T08:50:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/security-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/security-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/\",\"name\":\"ICR Evolution\",\"description\":\"Software para Call Center Omnicanal\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#organization\",\"name\":\"ICR Evolution\",\"url\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/icr-evolution.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logo-icrevolution.png\",\"contentUrl\":\"https:\\\/\\\/icr-evolution.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/logo-icrevolution.png\",\"width\":376,\"height\":76,\"caption\":\"ICR Evolution\"},\"image\":{\"@id\":\"https:\\\/\\\/www.icr-evolution.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security policy - ICR Evolution - Software para Call Center Omnicanal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.icr-evolution.com\/en\/security-policy\/","og_locale":"en_US","og_type":"article","og_title":"Security policy - ICR Evolution - Software para Call Center Omnicanal","og_description":"SECURITY POLICY TRUEITSYSTEMS S.L manages its information systems in line with best practices and in accordance with ISO 27001:2022. The Company adopts the following security principles: Regulatory Compliance: All information systems comply with applicable legal and regulatory security requirements. Risk Management: Risks are minimised to acceptable levels while maintaining a balance between security controls and [&hellip;]","og_url":"https:\/\/www.icr-evolution.com\/en\/security-policy\/","og_site_name":"ICR Evolution","article_modified_time":"2026-03-05T08:50:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.icr-evolution.com\/en\/security-policy\/","url":"https:\/\/www.icr-evolution.com\/en\/security-policy\/","name":"Security policy - ICR Evolution - Software para Call Center Omnicanal","isPartOf":{"@id":"https:\/\/www.icr-evolution.com\/en\/#website"},"datePublished":"2026-03-05T08:47:05+00:00","dateModified":"2026-03-05T08:50:25+00:00","breadcrumb":{"@id":"https:\/\/www.icr-evolution.com\/en\/security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.icr-evolution.com\/en\/security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.icr-evolution.com\/en\/security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.icr-evolution.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security policy"}]},{"@type":"WebSite","@id":"https:\/\/www.icr-evolution.com\/en\/#website","url":"https:\/\/www.icr-evolution.com\/en\/","name":"ICR Evolution","description":"Software para Call Center Omnicanal","publisher":{"@id":"https:\/\/www.icr-evolution.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.icr-evolution.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.icr-evolution.com\/en\/#organization","name":"ICR Evolution","url":"https:\/\/www.icr-evolution.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/icr-evolution.com\/wp-content\/uploads\/2020\/11\/logo-icrevolution.png","contentUrl":"https:\/\/icr-evolution.com\/wp-content\/uploads\/2020\/11\/logo-icrevolution.png","width":376,"height":76,"caption":"ICR Evolution"},"image":{"@id":"https:\/\/www.icr-evolution.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/pages\/23596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/users\/100017"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/comments?post=23596"}],"version-history":[{"count":1,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/pages\/23596\/revisions"}],"predecessor-version":[{"id":23600,"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/pages\/23596\/revisions\/23600"}],"wp:attachment":[{"href":"https:\/\/www.icr-evolution.com\/en\/wp-json\/wp\/v2\/media?parent=23596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}