Information Security Policy
Mod.5.2/02 - V0.4 APPROVED
At Urbana Smart Solutions, we develop innovative IoT solutions leveraging our expertise in software and hardware design, positioning ourselves on the international stage as a unique player with multidisciplinary skills.
Our primary strength lies in our ability to manage all components of a complex technological system, from development to the integration of IoT infrastructures, ensuring high-quality standards and services for our clients.
We operate as trusted experts for our clients, who rely on us due to our proven expertise and ongoing support in the implementation of enterprise-level solutions.
We are a company that believes in sustainable development, with strong attention and respect for the environment. To achieve this, our priority is to convey the benefits and opportunities of IoT technologies, which enable exceptional results through the continuous and timely optimization of systems.
Our Commitment
Urbana is committed to pursuing a policy that places the Client at the center of its activities, analyzing risks and opportunities while considering aspects related to its organizational context—both internal and external—as well as the requirements/needs of stakeholders, adopting a risk-based thinking approach and continuous improvement.
Our Client takes a central role, and their satisfaction is pursued by offering and tailoring all corporate processes to their needs while respecting applicable regulations, monitoring relevant markets, and ensuring confidentiality, integrity, and availability appropriate to the level of sensitivity of all client-provided information.
Taking into account stakeholders and their needs, Urbana bases its corporate development on the continuous improvement of its processes and services and sets the following objectives:
- Guarantee the research and selection of high-quality, client-tailored products.
- Ensure rapid assistance and supply, market competitiveness, and maximum quality results.
- Provide preparation and in-depth knowledge of the technologies sold and ensure certification of its personnel.
- Achieve stakeholder satisfaction (clients, users, employees, suppliers), including: meeting budget targets, increasing employment levels, consistently reducing the number of complaints, maintaining high levels of client satisfaction, establishing partnership agreements with suppliers, honoring explicit and implicit contractual commitments, providing client assistance, and fostering loyalty.
- Comply with environmental laws and regulations.
- Adhere to workplace safety regulations.
Urbana also considers the proper management and security of information as a primary objective.
This involves implementing—and maintaining as a goal—a certified information management system to ensure:
- Confidentiality – Information accessible only to duly authorized individuals and/or processes.
- Integrity – Safeguarding information consistency from unauthorized modifications.
- Availability – Ease of access to necessary information in accordance with access policies.
Other ISMS Objectives
- Ensure full knowledge of managed information and assess its criticality by implementing adequate protection levels.
- Guarantee secure access to information to prevent unauthorized or improperly authorized handling.
- Ensure that the organization and third parties collaborate in handling information by adopting procedures that comply with adequate security levels.
- Ensure that the organization and third parties collaborating in information handling are fully aware of security-related issues.
- Ensure that anomalies and incidents affecting the information system and corporate security levels are promptly identified and appropriately managed through efficient prevention, communication, and reaction systems to minimize business impact.
- Ensure that access to corporate premises is restricted to authorized personnel to secure areas and assets.
- Ensure compliance with legal requirements and adherence to security commitments established in contracts with third parties.
- Detect anomalous events, incidents, and vulnerabilities in information systems to uphold security and service availability.
- Guarantee corporate business continuity and disaster recovery through the application of established security procedures.
This policy is shared with all interested internal and external parties upon request, monitored for adequacy, and reviewed at least annually during the Management Review.