Information Security Policy

Last updated: 05/05/2025

Chekin’s Information Security Management System (ISMS) aims to protect information and provide employees, clients, and suppliers with a secure working environment through appropriate security measures and operating processes. Our principles are:

  • Confidentiality: information is accessible only to authorized individuals.
  • Integrity: information is complete, accurate, and unaltered.
  • Availability: information remains accessible to authorized users and resilient to disruptions.

Key commitments:

  • Ongoing training and awareness to continuously improve security.
  • Compliance with applicable laws and contractual obligations, including information security and data protection requirements.
  • Continual improvement of ISMS effectiveness through service measurement and monitoring.
  • Periodic risk analysis using a recognized methodology, with specific policies, technical solutions, and agreements with specialized organizations.
  • Staff work aligned with objectives, legal requirements, and client needs.
  • Selection of employees, suppliers, and subcontractors based on information security criteria.
  • Logging, analysis, and timely communication of incidents or weaknesses affecting confidentiality, integrity, or availability, with corrective and/or preventive actions.