Security Statement
Soluciones Inclusivas LLC
Introduction
This Security Statement applies to all products, services, websites, and applications offered by Soluciones Inclusivas LLC (hereinafter, “Soluciones Inclusivas” or “the Company”). We collectively refer to these as the “Services” in this Statement. This Security Statement also forms an integral part of the user agreements entered into with Soluciones Inclusivas customers.
Soluciones Inclusivas values the trust that its customers place in us by entrusting us with the custody of their data. We take our responsibility to protect and safeguard your information very seriously and strive to ensure total transparency regarding our security practices, which are described below. Likewise, our Privacy Policy describes the ways in which we use your data.
Infrastructure Security
Soluciones Inclusivas’ information systems and technical infrastructure are hosted on high-security cloud services. We implement robust security measures, including firewalls, intrusion detection systems, and continuous monitoring.
Key Information
Aspect | Detail |
---|---|
Infrastructure | Hosted on high-security cloud services |
Compliance standards | NIST SP 800-53, ISO/IEC 27001, GDPR, CCPA |
Access control | Multi-factor authentication, robust password policy |
Vulnerability management | Regular scans, penetration testing |
Breach notification | Procedures in compliance with applicable legislation |
Security contact | [email protected] |
WordPress Security
Soluciones Inclusivas acknowledges that our website is developed using WordPress, a platform that has experienced security vulnerabilities in the past and, if not properly configured, can be susceptible to attacks. Aware of these risks, we have implemented comprehensive measures to strengthen the security of our website:
These security measures not only protect our own website but are also part of the services we offer to our clients. Our “Security Hardening” service includes the implementation of these and other protective measures for websites based on WordPress, Drupal, Joomla, Moodle, among others; helping our clients maintain their platforms secure against evolving cyber threats.
Compliance
Soluciones Inclusivas has implemented governance, risk management, and compliance practices that align with internationally recognized information security frameworks. We strive to comply with cybersecurity standards such as NIST SP 800-53, ISO/IEC 27001, as well as data protection regulations such as GDPR and CCPA.
Access Control
Access to Soluciones Inclusivas’ technological resources is only allowed through secure connections that require multi-factor authentication. Our Password Policy requires them to be complex, have an expiration date, and cannot be reused. Soluciones Inclusivas grants access only when necessary according to the principle of least privilege, regularly reviews permissions, and revokes access immediately after staff disconnection.
Security Policies
Soluciones Inclusivas reviews and updates its information security-related policies annually. Staff must read and accept these policies each year, in addition to completing additional training relevant to their roles. The training is designed to comply with all specifications and regulations applicable to Soluciones Inclusivas.
Personnel
Soluciones Inclusivas conducts background checks when hiring its staff (to the extent permitted by applicable legislation). Likewise, Soluciones Inclusivas informs all its staff of its information security policies (which must be accepted), requires new staff to sign confidentiality agreements, and provides ongoing training on privacy and security issues.
Vulnerability Management
Soluciones Inclusivas has a vulnerability management program that includes periodic scans, identification, and correction of security vulnerabilities in servers, workstations, network equipment, and applications. We also conduct regular penetration tests to assess the robustness of our security measures.
Secure Coding and Development
Soluciones Inclusivas implements secure coding practices. Our development team uses techniques and best practices that focus on security by design. Development staff receive formal training in secure web application development practices.
Incident Management
Soluciones Inclusivas has a security incident response process that covers initial response, investigation, and customer notification, as well as public communication and error remediation. This process is reviewed and evaluated periodically.
Business Continuity
Soluciones Inclusivas maintains encrypted backups and has a strategy to ensure that downtime and data loss are minimal. Our Business Continuity Plan is tested and updated periodically.
Your Responsibilities
To ensure the security of your data, you need to maintain the security of your account by using complex passwords and storing them securely. Additionally, you must ensure that you have sufficient security measures in place on your own systems.
Logging and Monitoring
Soluciones Inclusivas’ application and infrastructure systems log information in a centrally controlled log repository. Logs are retained in accordance with regulatory requirements and are used for troubleshooting, security reviews, and analysis.
For any questions or concerns about this Security Statement, please contact us at:
Email: [email protected] Mailing address: 2093 Philadelphia Pike #7582 Claymont, DE 19703, USA
Last update:
September 19, 2024