{"id":7480,"date":"2024-02-22T19:57:25","date_gmt":"2024-02-22T19:57:25","guid":{"rendered":"https:\/\/RNM068DW\/wordpress\/?page_id=7480"},"modified":"2025-04-30T19:11:46","modified_gmt":"2025-04-30T19:11:46","slug":"certifications","status":"publish","type":"page","link":"https:\/\/rnmotion.com\/?page_id=7480","title":{"rendered":"Certifications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7480\" class=\"elementor elementor-7480\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-49b3912d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"49b3912d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=x5c-uHWqRzc&quot;,&quot;background_video_end&quot;:10,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-background-video-embed\" role=\"presentation\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b0bba45\" data-id=\"5b0bba45\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d279fe4 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"d279fe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f88ff808e50\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > ISO Certification<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-container &gt; .elementor-column&quot;,&quot;ease&quot;:&quot;linear&quot;,&quot;initValues&quot;:{&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7c25fb33 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c25fb33\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-105b34\" data-id=\"105b34\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3076714f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3076714f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9229480\" data-id=\"9229480\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-19e41852\" data-id=\"19e41852\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ab73433 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2ab73433\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f88ff8092d1\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > We are certified in ISO 27001\n<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9cb159 elementor-widget elementor-widget-spacer\" data-id=\"c9cb159\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bbbe1d8 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"1bbbe1d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f88ff8096bb\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > <b>In rnmotion<\/b>, we have implemented the best practices in our services and operations. <b>Obtaining an ISO 27001 certification<\/b> demonstrates our commitment to maintaining order and implementing appropriate <b>security controls to protect your information<\/b> assets, including sensitive and confidential data, from internal and external threats. <\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4aecd622\" data-id=\"4aecd622\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6675f7c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6675f7c9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5752108c\" data-id=\"5752108c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fbe2e42 elementor-widget elementor-widget-ld_fancy_image\" data-id=\"fbe2e42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-float=\"ease\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1197\" height=\"1198\" src=\"https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/iso.png\" class=\"attachment-full size-full wp-image-13524\" alt=\"\" srcset=\"https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/iso.png 1197w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/iso-300x300.png 300w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/iso-1024x1024.png 1024w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/iso-150x150.png 150w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/iso-320x320.png 320w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/iso-760x760.png 760w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/iso-650x650.png 650w\" sizes=\"(max-width: 1197px) 100vw, 1197px\" itemprop=\"image\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21ed5b2 elementor-widget elementor-widget-spacer\" data-id=\"21ed5b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-529e5dce elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"529e5dce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f88ff80a57b\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > Obtaining an <b>ISO 27001 certification<\/b><\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-14a2fed8\" data-id=\"14a2fed8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c774257 elementor-widget elementor-widget-ld_fancy_image\" data-id=\"c774257\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel perspective\" data-hover3d=\"true\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center transform-style-3d\">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\" data-stacking-factor=\"1\" data-reveal=\"true\" data-reveal-options=\"{&quot;direction&quot;:&quot;lr&quot;}\">\n\t\t\t\t\t<img decoding=\"async\" width=\"2376\" height=\"1584\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 1600 1067&#039;%2F%3E\" class=\"attachment-full size-full wp-image-13532 ld-lazyload\" alt=\"\" itemprop=\"image\" data-src=\"https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/AdobeStock_812964866.jpg\" data-srcset=\"https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/AdobeStock_812964866.jpg 2376w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/AdobeStock_812964866-300x200.jpg 300w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/AdobeStock_812964866-1024x683.jpg 1024w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/AdobeStock_812964866-1536x1024.jpg 1536w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/AdobeStock_812964866-2048x1365.jpg 2048w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/AdobeStock_812964866-720x480.jpg 720w\" data-sizes=\"(max-width: 2376px) 100vw, 2376px\" data-aspect=\"1.4995313964386\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-577e792 elementor-widget elementor-widget-spacer\" data-id=\"577e792\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83cb13e elementor-widget elementor-widget-text-editor\" data-id=\"83cb13e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At this point, we remain motivated to offer <b>security and quality<\/b>, comply with national regulations and standards, and continuously seek to evolve and implement the best practices in our services and operations. Thanks to this, we constantly strive to improve to provide security to our clients and partners. <b>Maintaining our ISO 27001 certification is part of our responsibilities and strategies to ensure proper Information Security management. <\/b>This reaffirms our commitment to continuous improvement for those who trust us and enables us to offer complete security to our clients and partners. However, if you are wondering what an ISO 27001 certification involves, here is a more detailed explanation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fba78af elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"fba78af\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_start&quot;:15}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"lqd-css-sticky-column elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6583def\" style=\"--lqd-sticky-offset:30px\" data-id=\"6583def\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b2ee125 elementor-widget elementor-widget-ld_fancy_image\" data-id=\"b2ee125\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"2952\" height=\"1619\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 1600 878&#039;%2F%3E\" class=\"attachment-full size-full wp-image-13537 ld-lazyload\" alt=\"\" itemprop=\"image\" data-src=\"https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/cinturon.jpg\" data-srcset=\"https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/cinturon.jpg 2952w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/cinturon-300x165.jpg 300w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/cinturon-1024x562.jpg 1024w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/cinturon-1536x842.jpg 1536w, https:\/\/rnmotion.com\/wp-content\/uploads\/2024\/05\/cinturon-2048x1123.jpg 2048w\" data-sizes=\"(max-width: 2952px) 100vw, 2952px\" data-aspect=\"1.8223234624146\" \/>\t\t\t\t\t\t\t\t\t\t<div class=\"lqd-imggrp-content lqd-imggrp-content-fixed-right lqd-imggrp-content-fixed lqd-imggrp-content-fixed-in\"><div class=\"lqd-imggrp-content-inner\"><p class=\"m-0\">Let's chat<\/p><\/div><\/div>\t\t\t\t\t<div class=\"lqd-v-lines lqd-overlay d-flex justify-content-center\"><div class=\"lqd-v-line d-inline-flex justify-content-start flex-grow-1 invisible\"><div class=\"h-100\"><\/div><\/div><div class=\"lqd-v-line d-inline-flex justify-content-start flex-grow-1\"><div class=\"h-100\"><\/div><\/div><div class=\"lqd-v-line d-inline-flex justify-content-start flex-grow-1\"><div class=\"h-100\"><\/div><\/div><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-dbbe6e1\" data-id=\"dbbe6e1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a3bd54 elementor-widget elementor-widget-heading\" data-id=\"6a3bd54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">FAQ<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d324c89 elementor-widget elementor-widget-spacer\" data-id=\"d324c89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-container&quot;,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-b0c6408 elementor-widget__width-initial elementor-widget elementor-widget-ld_accordion\" data-id=\"b0c6408\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"accordion accordion-body-underlined accordion-sm\" id=\"accordion-69f88ff82da9b\" role=\"tablist\" aria-multiselectable=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-1851\">\n\t\t\t\t<p class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69f88ff82da9b\" data-bs-parent=\"#accordion-69f88ff82da9b\" href=\"#collapse-1851\" data-target=\"#collapse-1851\" data-bs-target=\"#collapse-1851\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-1851\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">1. Information Security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-1851\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69f88ff82da9b\" role=\"tabpanel\" aria-labelledby=\"heading-1851\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p style=\"padding-inline-start: 3.75em;\">Is a crucial concern for any company worldwide, regardless of its size or industry sector. This is because <b>information <\/b>is one of the most valuable assets of a company, and its <b>protection is essential for ensuring the organization's continuity<\/b> and maintaining the trust of customers\/users or business partners.<\/p><p style=\"padding-inline-start: 3.75em;\">Considering this context, it is important to discuss the standards that can be applied to protect the information within organizations, <b>which is why we have standards such as ISO 27001<\/b>. This standard is a key tool for establishing an effective and efficient Information<b> Security Management System (ISMS)<\/b>.<br \/>Information security can be defined as a set of preventive and reactive measures that safeguard and protect information. In other words, it encompasses all policies and measures that affect the handling of data within an organization. It is also an integrated process that allows for the protection of identification, information management, and the risks that information may face.<\/p><p style=\"padding-inline-start: 3.75em;\">This <b>management is carried out through strategies and mitigation actions to ensure and maintain a company's data confidentially<\/b>. For example, at <b>rnmotion<\/b>, the decision was made to implement an ISMS leading to <b>ISO 27001 certification<\/b>, always aiming to lead by example for those around us.<br \/>Information security may involve various aspects, but they all revolve around information; communication, issue identification, risk analysis, and confidentiality are examples of this.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-1852\">\n\t\t\t\t<p class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69f88ff82da9b\" data-bs-parent=\"#accordion-69f88ff82da9b\" href=\"#collapse-1852\" data-target=\"#collapse-1852\" data-bs-target=\"#collapse-1852\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-1852\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\"> 2. What is ISO 27001 and what are the principles?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-1852\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69f88ff82da9b\" role=\"tabpanel\" aria-labelledby=\"heading-1852\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p style=\"padding-inline-start: 3.75em;\">The International Organization for Standardization (ISO), through the standards outlined in ISO\/IEC 27000, established an effective implementation of corporate information security, which was developed in the ISO 27001 standard. This is an <b>international standard that sets requirements for an Information Security Management System (ISMS).<\/b><\/p>\n<p style=\"padding-inline-start: 3.75em;\">This standard is intended to provide a framework for organizations worldwide to identify, assess, and manage risks related to information security, with the sole aim of protecting it from potential internal and external threats.<\/p>\n<p style=\"padding-inline-start: 3.75em;\">Organizational processes, such as policies, procedures, processes, etc., detail how to plan, implement, verify, and control an <b>Information Security Management System<\/b>, based on risk analysis and the planning and implementation of responses to mitigate them. In other words, any company or organization can deploy an ISMS following this standard.<\/p>\n<p style=\"padding-inline-start: 3.75em;\">This standard also aims to primarily fulfill three principles: <b>Confidentiality, Integrity, and Availability of information<\/b>, all of which are known in the world of information security as <b>CIA:<\/b><br><b>\u2022 Confidentiality:<\/b> Only authorized individuals can access the information.<br><b>\u2022 Integrity: <\/b>Protects the integrity of the information, and processing is carried out correctly.<br><b>\u2022 Availability of information: <\/b>Allows information to be available to authorized users and associated assets.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-1853\">\n\t\t\t\t<p class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69f88ff82da9b\" data-bs-parent=\"#accordion-69f88ff82da9b\" href=\"#collapse-1853\" data-target=\"#collapse-1853\" data-bs-target=\"#collapse-1853\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-1853\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">3. Requirements for ISO 27001 Certification? <\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-1853\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69f88ff82da9b\" role=\"tabpanel\" aria-labelledby=\"heading-1853\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p style=\"padding-inline-start: 3.75em;\">To obtain certification in ISO 27001, we went through the fulfillment of some specific requirements for information security management, including risk assessment, selection of security controls, and management of security incidents.<\/p><p style=\"padding-inline-start: 3.75em;\"><b>Requirements:<\/b><br>\u2022 Develop an Information Security Management System in accordance with ISO-27001 standard.<br>\u2022 Gather documentary evidence of the developed procedures, as well as associated records.<br>\u2022 Define and communicate an information security policy.<br>\u2022 Develop objectives aimed at continuous improvement of the system.<br>\u2022 Ensure management commitment.<br>\u2022 Appoint a responsible person for the Information Security Management System.<br>\u2022 Conduct an information security risk assessment.<br>\u2022 Carry out a risk treatment process.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-1854\">\n\t\t\t\t<p class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69f88ff82da9b\" data-bs-parent=\"#accordion-69f88ff82da9b\" href=\"#collapse-1854\" data-target=\"#collapse-1854\" data-bs-target=\"#collapse-1854\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-1854\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">4. How to obtain ISO 27001 Certification as we did at rnmotion?<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-1854\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69f88ff82da9b\" role=\"tabpanel\" aria-labelledby=\"heading-1854\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p style=\"padding-inline-start: 3.75em;\">To obtain ISO 27001 certification, the company must go through the process of implementing the standard and then undergo an external audit through a certified organization.<br \/>Steps for implementing the 27001 standards:<br \/>Step 1: Initial Assessment<br \/>An initial assessment of the company is conducted. This involves evaluating the maturity of information security in the organization, identifying areas of risk, and determining existing security controls.<br \/>Step 2: Development of Implementation Plan<br \/>Once the initial assessment is completed, the next step is to develop an implementation plan. This plan should include a detailed schedule and a set of activities to be carried out to implement the ISMS. It should also include a list of necessary security controls.<br \/>Step 3: Implementation of the Information Security Management System<br \/>This part involves implementing the security controls identified in the plan and developing the necessary procedures to maintain and improve the ISMS. During this step, it is important that all employees are involved and ensure they understand the importance of information security.<br \/>Step 4: Internal Audit<br \/>Once the ISMS is implemented, the company must conduct an internal audit to ensure that all security controls have been implemented correctly and that the ISMS functions as planned. The internal audit should be conducted by an auditor who has not been involved in the implementation of the ISMS.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-1855\">\n\t\t\t\t<p class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69f88ff82da9b\" data-bs-parent=\"#accordion-69f88ff82da9b\" href=\"#collapse-1855\" data-target=\"#collapse-1855\" data-bs-target=\"#collapse-1855\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-1855\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">5. Phases of the external audit to obtain ISO 27001 Certification<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-1855\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69f88ff82da9b\" role=\"tabpanel\" aria-labelledby=\"heading-1855\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p style=\"padding-inline-start: 3.75em;\"><b>The external certification audit is the final stage in obtaining ISO 27001 certification.<\/b> This certification audit is conducted by an independent certification organization, which evaluates whether the ISMS complies with the requirements of the ISO 27001 standard and consists of the following phases:<\/p>\n<p style=\"padding-inline-start: 3.75em;\"><b>Phase 1: Analysis<\/b><br>Here, external auditors verify whether the procedures and controls of the <b>ISO 27001 <\/b>standard have been implemented. Additionally, they share the results in case they detected any gaps, which must be addressed.<\/p>\n<p style=\"padding-inline-start: 3.75em;\"><b>Phase 2: Formal Evaluation<\/b><br>Once all requirements have been met and the analysis conducted by the <b>external auditor indicates that the process<\/b> can continue, the second phase begins. This phase involves <b>evaluating the implementation of the organization's procedures and controls to certify that they are effectively functioning as required by the certification.<\/b><br>The auditor(s) typically visit the company to verify that all activities within the organization comply with the ISO 27001 standard. Records and documentation related to the ISMS will be reviewed, staff will be interviewed, and physical inspections will be carried out.<\/p>\n<p style=\"padding-inline-start: 3.75em;\"><b>Phase 3: Reporting and Certification<\/b><br>After the external certification audit has been conducted, the company should receive an audit report that includes any findings and recommendations for improvement. If the organization has met all the requirements of the standard, it will be awarded the ISO 27001 certification.<\/p>\n<p style=\"padding-inline-start: 3.75em;\"><b>Phase 4: Monitoring<\/b><br>After confirming that everything is in order and granting the ISO 27001 certificate, the company will receive periodic visits from auditors to ensure that the management system continues to comply with the requirements and is continuously improving. For example, at the end of 2023, at rnmotion, we closed the year with a positive result in the external ISO 27001 audit, which must be conducted annually, and through which we managed to obtain our certification.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-1856\">\n\t\t\t\t<p class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69f88ff82da9b\" data-bs-parent=\"#accordion-69f88ff82da9b\" href=\"#collapse-1856\" data-target=\"#collapse-1856\" data-bs-target=\"#collapse-1856\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-1856\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">6. Benefits for companies<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-1856\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69f88ff82da9b\" role=\"tabpanel\" aria-labelledby=\"heading-1856\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p><b>Having ISO 27001 certification is highly beneficial for companies aiming to enhance their information security.<\/b> The standard provides a detailed guide for implementing an ISMS, enabling companies to assess and manage information security risks.<br>Implementing ISO 27001 in companies exponentially aids in reducing the risk of cyberattacks, which remain a global threat. This vulnerability particularly affects organizations holding valuable or personal confidential information. <b>By implementing an ISMS according to ISO 27001, all companies can identify and mitigate cybersecurity risks, thereby reducing the likelihood of cyberattacks and minimizing the impact of any digital security incidents<\/b>. Risk analysis and action planning allow for the implementation of controls to prevent exploitation of system weaknesses.<\/p>\n<p>Another benefit of ISO 27001 is its assistance in helping organizations comply with information security regulations and standards. In Mexico, there are specific regulations regarding privacy and data protection, such as the Federal Law on Protection of Personal Data Held by Private Parties (LFPDPPP). This law regulates the handling of personal data by companies, and ISO 27001 implementation helps companies comply with these regulations and demonstrate their commitment to data privacy and security.<\/p>\n<p>Furthermore, adhering to <b>ISO 27001 practices and obtaining certification demonstrates a company's commitment to information security. <\/b>This can enhance customer trust in the company, potentially leading to increased business opportunities, as many companies demand that their suppliers or partners hold such certifications as a guarantee of legal compliance.<\/p>\n<p>Moreover, with a well-structured risk analysis, resources are typically used to reduce risks generally rather than focusing on specific areas, resulting in cost savings in these processes. Additionally, ISO 27001 emphasizes the organization's commitment to continually improving its management processes. Therefore, internal audits must be conducted to review and analyze areas for improvement, allowing for adjustments to processes if necessary. <b>It's essential to establish internal organization and clarify responsibilities <\/b>and roles to eliminate uncertainties regarding decision-making and process oversight, as mandated by the standard.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"accordion-item panel \">\n\n\t\t\t\t<div class=\"accordion-heading\" role=\"tab\" id=\"heading-1857\">\n\t\t\t\t<p class=\"accordion-title  tabindex=\"-1\">\t\t\t\t\t<a class=\"collapsed\" role=\"button\" data-toggle=\"collapse\" data-bs-toggle=\"collapse\"\n                    tabindex=\"0\"\n\t\t\t\t\tdata-parent=\"#accordion-69f88ff82da9b\" data-bs-parent=\"#accordion-69f88ff82da9b\" href=\"#collapse-1857\" data-target=\"#collapse-1857\" data-bs-target=\"#collapse-1857\"\n\t\t\t\t\taria-expanded=\"false\" aria-controls=\"collapse-1857\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-title-txt\">7. Information Security Policy for Stakeholders <\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"accordion-expander\"><i class=\"lqd-icn-ess icon-ion-ios-add\"><\/i><i class=\"lqd-icn-ess icon-ion-ios-remove\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<div id=\"collapse-1857\" class=\"accordion-collapse collapse \" data-bs-parent=\"#accordion-69f88ff82da9b\" role=\"tabpanel\" aria-labelledby=\"heading-1857\">\n\n\t\t\t\t<div class=\"accordion-content\">\n\t\t\t\t\t<p>At rnmotion, we are committed to ensuring the confidentiality, integrity, and availability of information for our clients, employees, and partners. Our Information Security Management System (ISMS), including this policy, complies with all applicable legal, regulatory, and contractual requirements related to information security. Through continuous improvement, we aim to meet our information security objectives in alignment with the applicable legal framework and the standards established by ISO\/IEC 27001.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"1. Information Security\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Is a crucial concern for any company worldwide, regardless of its size or industry sector. This is because information is one of the most valuable assets of a company, and its protection is essential for ensuring the organization's continuity and maintaining the trust of customers\\\/users or business partners.Considering this context, it is important to discuss the standards that can be applied to protect the information within organizations, which is why we have standards such as ISO 27001. This standard is a key tool for establishing an effective and efficient Information Security Management System (ISMS).Information security can be defined as a set of preventive and reactive measures that safeguard and protect information. In other words, it encompasses all policies and measures that affect the handling of data within an organization. It is also an integrated process that allows for the protection of identification, information management, and the risks that information may face.This management is carried out through strategies and mitigation actions to ensure and maintain a company's data confidentially. For example, at rnmotion, the decision was made to implement an ISMS leading to ISO 27001 certification, always aiming to lead by example for those around us.Information security may involve various aspects, but they all revolve around information; communication, issue identification, risk analysis, and confidentiality are examples of this.\"}},{\"@type\":\"Question\",\"name\":\"2. What is ISO 27001 and what are the principles?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The International Organization for Standardization (ISO), through the standards outlined in ISO\\\/IEC 27000, established an effective implementation of corporate information security, which was developed in the ISO 27001 standard. This is an international standard that sets requirements for an Information Security Management System (ISMS).This standard is intended to provide a framework for organizations worldwide to identify, assess, and manage risks related to information security, with the sole aim of protecting it from potential internal and external threats.Organizational processes, such as policies, procedures, processes, etc., detail how to plan, implement, verify, and control an Information Security Management System, based on risk analysis and the planning and implementation of responses to mitigate them. In other words, any company or organization can deploy an ISMS following this standard.This standard also aims to primarily fulfill three principles: Confidentiality, Integrity, and Availability of information, all of which are known in the world of information security as CIA: Confidentiality: Only authorized individuals can access the information. Integrity: Protects the integrity of the information, and processing is carried out correctly. Availability of information: Allows information to be available to authorized users and associated assets.\"}},{\"@type\":\"Question\",\"name\":\"3. Requirements for ISO 27001 Certification?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"To obtain certification in ISO 27001, we went through the fulfillment of some specific requirements for information security management, including risk assessment, selection of security controls, and management of security incidents.Requirements: Develop an Information Security Management System in accordance with ISO-27001 standard. Gather documentary evidence of the developed procedures, as well as associated records. Define and communicate an information security policy. Develop objectives aimed at continuous improvement of the system. Ensure management commitment. Appoint a responsible person for the Information Security Management System. Conduct an information security risk assessment. Carry out a risk treatment process.\"}},{\"@type\":\"Question\",\"name\":\"4. How to obtain ISO 27001 Certification as we did at rnmotion?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"To obtain ISO 27001 certification, the company must go through the process of implementing the standard and then undergo an external audit through a certified organization.Steps for implementing the 27001 standards:Step 1: Initial AssessmentAn initial assessment of the company is conducted. This involves evaluating the maturity of information security in the organization, identifying areas of risk, and determining existing security controls.Step 2: Development of Implementation PlanOnce the initial assessment is completed, the next step is to develop an implementation plan. This plan should include a detailed schedule and a set of activities to be carried out to implement the ISMS. It should also include a list of necessary security controls.Step 3: Implementation of the Information Security Management SystemThis part involves implementing the security controls identified in the plan and developing the necessary procedures to maintain and improve the ISMS. During this step, it is important that all employees are involved and ensure they understand the importance of information security.Step 4: Internal AuditOnce the ISMS is implemented, the company must conduct an internal audit to ensure that all security controls have been implemented correctly and that the ISMS functions as planned. The internal audit should be conducted by an auditor who has not been involved in the implementation of the ISMS.\"}},{\"@type\":\"Question\",\"name\":\"5. Phases of the external audit to obtain ISO 27001 Certification\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The external certification audit is the final stage in obtaining ISO 27001 certification. This certification audit is conducted by an independent certification organization, which evaluates whether the ISMS complies with the requirements of the ISO 27001 standard and consists of the following phases:Phase 1: AnalysisHere, external auditors verify whether the procedures and controls of the ISO 27001 standard have been implemented. Additionally, they share the results in case they detected any gaps, which must be addressed.Phase 2: Formal EvaluationOnce all requirements have been met and the analysis conducted by the external auditor indicates that the process can continue, the second phase begins. This phase involves evaluating the implementation of the organization's procedures and controls to certify that they are effectively functioning as required by the certification.The auditor(s) typically visit the company to verify that all activities within the organization comply with the ISO 27001 standard. Records and documentation related to the ISMS will be reviewed, staff will be interviewed, and physical inspections will be carried out.Phase 3: Reporting and CertificationAfter the external certification audit has been conducted, the company should receive an audit report that includes any findings and recommendations for improvement. If the organization has met all the requirements of the standard, it will be awarded the ISO 27001 certification.Phase 4: MonitoringAfter confirming that everything is in order and granting the ISO 27001 certificate, the company will receive periodic visits from auditors to ensure that the management system continues to comply with the requirements and is continuously improving. For example, at the end of 2023, at rnmotion, we closed the year with a positive result in the external ISO 27001 audit, which must be conducted annually, and through which we managed to obtain our certification.\"}},{\"@type\":\"Question\",\"name\":\"6. Benefits for companies\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Having ISO 27001 certification is highly beneficial for companies aiming to enhance their information security. The standard provides a detailed guide for implementing an ISMS, enabling companies to assess and manage information security risks.Implementing ISO 27001 in companies exponentially aids in reducing the risk of cyberattacks, which remain a global threat. This vulnerability particularly affects organizations holding valuable or personal confidential information. By implementing an ISMS according to ISO 27001, all companies can identify and mitigate cybersecurity risks, thereby reducing the likelihood of cyberattacks and minimizing the impact of any digital security incidents. Risk analysis and action planning allow for the implementation of controls to prevent exploitation of system weaknesses.Another benefit of ISO 27001 is its assistance in helping organizations comply with information security regulations and standards. In Mexico, there are specific regulations regarding privacy and data protection, such as the Federal Law on Protection of Personal Data Held by Private Parties (LFPDPPP). This law regulates the handling of personal data by companies, and ISO 27001 implementation helps companies comply with these regulations and demonstrate their commitment to data privacy and security.Furthermore, adhering to ISO 27001 practices and obtaining certification demonstrates a company's commitment to information security. This can enhance customer trust in the company, potentially leading to increased business opportunities, as many companies demand that their suppliers or partners hold such certifications as a guarantee of legal compliance.Moreover, with a well-structured risk analysis, resources are typically used to reduce risks generally rather than focusing on specific areas, resulting in cost savings in these processes. Additionally, ISO 27001 emphasizes the organization's commitment to continually improving its management processes. Therefore, internal audits must be conducted to review and analyze areas for improvement, allowing for adjustments to processes if necessary. It's essential to establish internal organization and clarify responsibilities and roles to eliminate uncertainties regarding decision-making and process oversight, as mandated by the standard.\"}},{\"@type\":\"Question\",\"name\":\"7. Information Security Policy for Stakeholders\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"At rnmotion, we are committed to ensuring the confidentiality, integrity, and availability of information for our clients, employees, and partners. Our Information Security Management System (ISMS), including this policy, complies with all applicable legal, regulatory, and contractual requirements related to information security. Through continuous improvement, we aim to meet our information security objectives in alignment with the applicable legal framework and the standards established by ISO\\\/IEC 27001.\"}}]}<\/script>\n\t\t\t\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ISO Certification We are certified in ISO 27001 In rnmotion, we have implemented the best practices in our services and operations. Obtaining an ISO 27001 certification demonstrates our commitment to maintaining order and implementing appropriate security controls to protect your information assets, including sensitive and confidential data, from internal and external threats. Obtaining an ISO [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7480","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/rnmotion.com\/index.php?rest_route=\/wp\/v2\/pages\/7480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rnmotion.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rnmotion.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rnmotion.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rnmotion.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7480"}],"version-history":[{"count":96,"href":"https:\/\/rnmotion.com\/index.php?rest_route=\/wp\/v2\/pages\/7480\/revisions"}],"predecessor-version":[{"id":15840,"href":"https:\/\/rnmotion.com\/index.php?rest_route=\/wp\/v2\/pages\/7480\/revisions\/15840"}],"wp:attachment":[{"href":"https:\/\/rnmotion.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}