Logo
Trust
Privacy and security

Technology is now part of our lives. Our environment is now 100% digital digital and hyper-connected. digital and hyper-connected.

That is why we work to ensure that our customers get the most from technology in a responsible way, ensuring their security and privacy.

Privacy

We promote policies and processes in which our stakeholders participate, to strengthen our commitment to privacy:

  • We establish a management model with clear responsibilities which report directly to the board of directors.
  • We promote and periodically review our policies and processes..
This web site uses cookies for a better experience. We will assume that you agree with this, but you can choose not to participate if you wish. Bloqued content Google Youtube
  • We put it into practice, increasing transparency and facilitating dialogue:

    We have a public centre with information about our actions in the sphere of privacy.

    Each year, we publish the formal notices we receive from the authorities in relation to legal interception, access to metadata, blockage and filtering of contents, and suspension of services.

Security

We create a secure environment with solid processes which we periodically review. So, the Company’s highest authority in this sphere is the Global Chief Security and Intelligence Officer, who participates in the Executive Committee and the Digital Security Committee, reporting to the Board.

image/svg+xml BOARD OF DIRECTORS AUDIT AND CONTROL COMMITTEE REGULATORY AND INSTITUTIONAL AFFAIRS COMMITTEE GLOBAL CHIEF SECURITY AND INTELLIGENCE OFFICER COUNTRY CHIEF SECURITY OFFICERS Responsible business plan

GLOBAL SECURITY POLICY

STANDARDS
REGULATIONS
  • Classification of Treatment of Information
  • Incident management
  • Business continuity
  • Change management
  • Risk analysis
  • Supply chain security
  • Access control
  • Platform security
  • Security of people
  • Physical security
  • Comms. security
  • Asset management
  • Security of Development Life Cycle
  • Cyber-security
REVIEW AND FULFILMENT

We put it into practice:

  • We have a network of Incident Response Centres (IRCs) which identify and analyse the risks of potential cyber-threats and also monitor the existing serious vulnerabilities in the most critical technological assets.
  • We develop cyber-security services through ElevenPaths, which improve the efficacy of our security infrastructure.
  • Our 11 Security Operations Centres (SOCs) and the Advanced Global Centre (SOCTAGS) enable us to tackle the challenges with an approach which is both global and close to our customers.
Artificial intelligence

We are one of the first companies to promote the development of Artificial Intelligence focussed on people, and which at the same time is fair, secure and transparent.

image/svg+xml OUR ARTIFICIAL INTELLIGENCE PRINCIPLES Big Data and Artificial Intelligence (AI) enable us to transform businesses, people’s lives and society. With these advances, we want to improve as a Company while at the same time making the world a better place for everyone. Therefore, we pledge to design, develop and use AI which is: FAIR TRANSPARENT AND EXPLAINABLE PEOPLE With as the priority PARTNERS With and third parties PRIVACY AND SECURITY With from the design
This web site uses cookies for a better experience. We will assume that you agree with this, but you can choose not to participate if you wish. Bloqued content Google Youtube
Responsible use
of technology

We believe it is people who give meaning to technology. This is why we have defined a global strategy for responsible and intelligent use of the Internet and devices, in all areas of life, thereby protecting the most vulnerable.

Ensuring a secure Internet is not a task we can tackle alone. For this reason, we work together with sector and civil society partners, to make children and young people aware that the Internet is an open window full of opportunities, but that there are also risks that need to be managed.

In this respect, we can emphasise our collaboration with:

  • National law enforcement forces, as well as support for the different national reporting lines.
  • Sectoral organisations, NGOs, and national and international associations.
  • Associations with key stakeholders in online child protection.

To see the complete list of our activities in 2018, please consult our report.

Globally, we work with other organisations to promote good use of the Internet such as:

Alliance with the GSMA to combat content involving child sexual abuse.

ICT Coalition

Alliance to better protect minors online.

Although we firmly believe that nothing can replace the mediating and educational work of an adult on responsible use of technology, when this is not possible, we will always have the support of technology. To this end, we are committed to promoting and developing products and services that raise awareness about responsible and safe use of the Internet and connected devices:

  • Parental controls
  • Security solutions with parental control functionality.
  • Other services such as security, connectivity and personalised packs.

To see the complete list of our activities in 2018, please consult our report.

Technological development is unstoppable: Big Data, robotics, Artificial Intelligence… Each advance, big or small, represents a new educational challenge that we have to take advantage of.

We are committed to training and awareness-raising initiatives that reach all audiences:

The Dialogando portal is an example of this.

Active in 15 countries, it calls for a reflection on the use we make of technology on a daily basis, thanks to the materials and resources prepared by experts in the digital field.

Other awareness initiatives:

  • AWARENESS-RAISING INITIATIVES On cyber-bullying, eSports, grooming, etc. 31
  • MILLION PEOPLE IMPACTED 84.9

This web site uses cookies for a better experience. We will assume that you agree with this, but you can choose not to participate if you wish.