{"id":13295,"date":"2022-11-17T10:03:48","date_gmt":"2022-11-17T10:03:48","guid":{"rendered":"https:\/\/www.lever.gr\/geniki-politiki-asfaleias-pliroforias\/"},"modified":"2025-06-23T21:25:59","modified_gmt":"2025-06-23T21:25:59","slug":"geniki-politiki-asfaleias-pliroforias","status":"publish","type":"page","link":"https:\/\/www.lever.gr\/en\/geniki-politiki-asfaleias-pliroforias\/","title":{"rendered":"General Information Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13295\" class=\"elementor elementor-13295 elementor-7917\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e4667ed elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"e4667ed\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-711b92bd\" data-id=\"711b92bd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c8a98ec elementor-widget elementor-widget-heading\" data-id=\"5c8a98ec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">General Information Security Policy<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ded6ea1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ded6ea1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a536cba\" data-id=\"a536cba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19048d3 elementor-widget elementor-widget-text-editor\" data-id=\"19048d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Information Security is a top priority in order to:<\/span><\/p><ul><li><span style=\"font-weight: 400;\">Ensure the company&#8217;s full compliance with the relevant legal and regulatory requirements,<\/span><\/li><li><span style=\"font-weight: 400;\">Protect the interests of the company and those who do business with it and trust it for the use and transfer of their confidential data<\/span><\/li><li><span style=\"font-weight: 400;\">Ensure the availability, integrity and confidentiality of information produced, received and transferred within the framework of security projects.<\/span><\/li><li><span style=\"font-weight: 400;\">Maximize the reliability of the company&#8217;s information resources.<\/span><\/li><\/ul><div>\u00a0<\/div><p><span style=\"font-weight: 400;\">The implementation of the Information Security Management System implemented by the company aims at the following:<\/span><\/p><ul><li><span style=\"font-weight: 400;\">Protection of the stored file, computing resources and information circulating in the company&#8217;s services from any threat, internal or external, intentional or accidental,<\/span><\/li><li><span style=\"font-weight: 400;\">Systematic assessment and evaluation of risks related to information security, aiming at their proper and timely management,<\/span><\/li><li><span style=\"font-weight: 400;\">Data archiving, prevention of viruses and external intrusions, access control to systems, recording of all security incidents and management of unexpected developments,<\/span><\/li><li><span style=\"font-weight: 400;\">Continuous information of the management and staff on information security issues and the conduct of training seminars for the staff,<\/span><\/li><li><span style=\"font-weight: 400;\">Full commitment of the company&#8217;s Management to the faithful implementation and continuous improvement of the Information Security Management System, which complies with the requirements of the ISO 27001:2022 standard.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">The Information Security Management System Manager is responsible for controlling and monitoring the operation of the Information Security Management System, as well as for informing all involved personnel about the Information Security Policy.<\/span><\/p><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">All personnel involved in the activities and procedures described and related to Information Security are responsible for implementing the policy and the corresponding Information Security Procedures in their field of work.<\/span><\/p><p>\u00a0<\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">The Management and all employees are committed to achieving the company&#8217;s objectives and adhering to the principles in relation to Information Security.<\/span><\/p><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">In order to achieve the above, the Company implements an Information Security Management System according to the EN ISO 27001:2022 standard.<\/span><\/p><p>\u00a0<\/p><p><strong>THE MANAGEMENT<\/strong><\/p><p><strong>2nd edition, 08\/01\/2024<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>General Information Security Policy Information Security is a top priority in order to: Ensure the company&#8217;s full compliance with the relevant legal and regulatory requirements, Protect the interests of the company and those who do business with it and trust it for the use and transfer of their confidential data Ensure the availability, integrity and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-13295","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.lever.gr\/en\/wp-json\/wp\/v2\/pages\/13295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lever.gr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.lever.gr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.lever.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lever.gr\/en\/wp-json\/wp\/v2\/comments?post=13295"}],"version-history":[{"count":4,"href":"https:\/\/www.lever.gr\/en\/wp-json\/wp\/v2\/pages\/13295\/revisions"}],"predecessor-version":[{"id":13299,"href":"https:\/\/www.lever.gr\/en\/wp-json\/wp\/v2\/pages\/13295\/revisions\/13299"}],"wp:attachment":[{"href":"https:\/\/www.lever.gr\/en\/wp-json\/wp\/v2\/media?parent=13295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}