INFORMATION SECURITY POLICY
Bode Logo

PROTECTION OF INFORMATION ASSETS: Protect all information assets (customer data, design documents, production and operational information) against internal and external threats and ensure continuity of IT systems.

CONFIDENTIALITY, INTEGRITY AND ACCESS CONTROL: Safeguard information against unauthorized access, ensuring its integrity and confidentiality.

TECHNOLOGY AND SYSTEM SECURITY: Continuously protect IT infrastructure and technological systems against security threats and apply up-to-date security measures.

DATA MANAGEMENT AND ARCHIVING: Ensure proper classification, secure storage, and timely archiving of information assets to prevent data loss and misuse.

LEGAL AND CONTRACTUAL COMPLIANCE: Fully comply with sectoral regulations, contracts, and relevant requirements.

INFORMATION SECURITY AWARENESS AND TRAINING: Ensure employees participate regularly in training and awareness programs.

INCIDENT MANAGEMENT: Implement effective response, notification, and improvement processes in case of information security breaches or incidents.

SUPPLIER AND THIRD-PARTY SECURITY: Secure information shared with partners and suppliers and enforce security requirements.

CONTINUOUS IMPROVEMENT: Manage information security risks, continuously review protective measures, and improve them.

INFORMATION SECURITY POLICY