Restricted access to your personal data
Securely storing and transmitting personal data
Protection of information systems through devices that prevent unauthorized access to your personal
Implementation of mechanisms that guarantee the safeguarding of the integrity and quality of your personal data
Regular monitoring of information systems, with the aim of preventing, detecting and preventing the misuse of your personal data
Redundancy of equipment for the storage, processing and communication of personal data, to avoid loss of availability