Information security policies
This document provides a framework for ensuring the confidentiality, integrity, and availability of information. It establishes the rules and procedures for the use, storage, and transmission of information, and ensures that all employees are aligned with best practices in information security.
Purpose of the organization and scope
Prexus's purpose is to support its clients in the design and implementation of their pricing processes—optimizing prices per product and discounts per customer.
This policy applies to all areas of Prexus, including employees, suppliers, contractors, and other stakeholders who have access to information through various channels, especially for the implementation of the Information Security Management System (ISMS), which will be implemented upon the issuance of these policies.
Purpose of data processing
We process your data for the following general and specific purposes:
Commercial management: To contact you and provide information about our consulting services requested through simulators or forms.
Communication and information: To send blog updates, newsletters, and educational content about pricing strategies.
Statistical analysis: To use device information to detect potential abuse and generate aggregated statistics about site usage (this data does not identify individual users).
Legal compliance: To fulfill contractual or legal obligations involving our stakeholders.
Cybersecurity strategy
Prexus' cybersecurity strategy is based on the principle of cyber resilience, grounded in an Information Security Management System (ISMS) based on continuous improvement and the implementation of technical and human controls to guarantee the integrity, confidentiality, and availability of information.
The ISMS is aligned with the 2022 version. The management system will develop the policies, processes, and procedures necessary for compliance with this policy.
Last updated: January 15, 2023. This policy has been approved by the management of PREXUS consultoría S.A.S.
