Privacy Policy
We want you to know, through this notice, what are the criteria that we follow regarding the use of the data that you provide us through the website to which you have accessed as a user and from which Gestión Estratégica Empresarial SA de CV, from now on, KREIOS is the owner.
This company is committed to the security of its users' data. When we ask you to fill in the fields of personal information with which you can be identified, we do so ensuring that it will only be used in accordance with the terms of this document. However, this Privacy Policy may change over time or be updated, so we recommend and emphasize that you continually review this page to ensure that you agree with said changes.
Information that is collected
Our website may collect personal information such as: Name, contact information such as your email address and demographic information. Likewise, when necessary, specific information may be required to process an order or make a delivery or billing.
Use of collected information
Our website uses the information in order to provide the best possible service, particularly to maintain a register of users, of orders, if applicable, and to improve our products and services. It is possible that emails will be sent periodically through our site with special offers, new products and other advertising information that we consider relevant to you or that may provide you with some benefit, these emails will be sent to the address you provide and may be canceled anytime.
KREIOS is highly committed to fulfilling the commitment to keep your information secure. We use the most advanced systems and constantly update them to ensure that there is no unauthorized access.
cookies
A cookie refers to a file that is sent in order to request permission to be stored on your computer, by accepting said file it is created and the cookie then serves to have information regarding web traffic, and also facilitates future visits to a web recurrent. Another function that cookies have is that with them the web can recognize you individually and therefore provide you with the best personalized service on its web.
Our website uses cookies to be able to identify the pages that are visited and their frequency. This information is used only for statistical analysis and then the information is permanently deleted. You can delete cookies at any time from your computer. However, cookies help to provide a better service on websites, you do not give access to information from your computer or from you, unless you want it and provide it directly, visits to a website . You can accept or deny the use of cookies, however most browsers automatically accept cookies as it serves to have a better web service. You can also change your computer settings to decline cookies. If they are declined, you may not be able to use some of our services.
Links to Third Parties
This website may contain links to other sites that may be of interest to you. Once you click on these links and leave our page, we no longer have control over the site to which you are redirected and therefore we are not responsible for the terms or privacy or the protection of your data on those other third party sites. These sites are subject to their own privacy policies, so it is recommended that you consult them to confirm that you agree with them.
Control of your personal information
At any time you can restrict the collection or use of personal information that is provided to our website. Each time you are asked to fill in a form, such as user registration, you can mark or unmark the option to receive information by email. In case you have marked the option to receive our newsletter or advertising, you can cancel it at any time.
This company will not sell, transfer or distribute the personal information that is collected without your consent, unless required by a judge with a court order.
KREIOS reserves the right to change the terms of this Privacy Policy at any time.
Information about the person in charge of the treatment
Data Controller: Gestión Estratégica Empresarial SA de CV
Address: Indianapolis 89, Residencial Prima 114, Col Napoles, Benito Juarez, CDMX 03810
e-mail: support@kreios.mx
In the selection of the destruction method, in addition to the level of confidentiality of the information contained in the documentation to be eliminated, the type of medium that contains it must be taken into account.
No data will be stored physically
Electronic documents have specific characteristics that must be taken into account when eliminating them:
They are stored on storage media with a specific format
The informative content is independent of the medium and the format
Holders are generally reusable
Its useful life is short compared to that of a paper support
All support or format will become obsolete in a more or less long period of time, which will necessarily imply a change of support or format (except for some long-lived formats such as PDF / A).
Destruction procedures must take into account the characteristics of the most suitable media for the preservation of electronic documents.
There may be multiple copies, not always controlled, of the documents.
Taking into account these characteristics of electronic documentation, it is proposed to use the terms erasure, understood as the procedure for eliminating data or files from a support or set of supports, allowing their reuse, and destruction, understood as the process of physical destruction of supports storage containing electronic documents.
The appropriate erasing techniques must be identified for each medium (if it is optical, magnetic, external memories ...) and the type of information it contains. As in any other destruction process, it is necessary to record the erasure procedures performed.
The most commonly used storage media and systems are:
Information on optical data carriers, for example CDs / DVDs. Currently their use is in decline since they cannot compete with the capacity provided by magnetic type supports.
Information on magnetic data carriers, for example ID cards, floppy disks, etc. Use in reverse due to its low capacity.
Information on magnetic hard drives.
Information on electronic data carriers, for example on USB sticks or chip cards.
Without going into much detail due in part to the large amount of technical data, the specific techniques for secure erasure of documents and destruction of media most used today are:
Overwriting: it consists of replacing the stored data with a binary pattern of nonsense information. The effectiveness of this method depends on the number of overwrite cycles. There are advanced procedures that make it possible to know, with enough precision, the information that originally existed, so the information that must be overwritten must generate such disorder on the magnetic medium that the recovery of the original data is practically impossible. It cannot be used on damaged media or non-rewritable media, such as write-only CDs and DVDs.
Demagnetization: consists of exposing the storage media to a strong enough magnetic field to modify the polarity of the magnetic particles and, therefore, eliminate the stored data, preventing their recovery. Valid for magnetic devices, such as hard drives or tape cartridges. It has several drawbacks, such as that it must be analyzed which electromagnetic field has to be used for each device, the devices have to be moved to the place where the degausser is located and in some magnetic recording media (those with Flash memory cache) deletes all stored information.
Physical destruction: consists of the disabling of the support. It can be done by:
disintegration: a non-uniform cutting or crushing mechanism that reduces the device to pieces of random size and shape.
pulverization: a process that consists of crushing the material and is used to destroy hard drives.
fusion: a process by which material is heated to a temperature that is lower than the ignition point but high enough to melt it, can be an effective means of destruction for hard drives.
incineration: can completely destroy all devices and for all security levels. It must be carried out in incinerators that have been approved for environmental impact, for plastics and other materials.
shredding: consists of reducing the support to tiny pieces of uniform size and shape. The use of shredders is normally limited to thin-thickness media, such as optical data media (DVDs or CDs).
Physical destruction methods can be completely safe in terms of the actual destruction of the data, but they have some drawbacks such as that the waste generated must be treated properly, that imply the use of different industrial methods of destruction depending on the support or that require a transport of the devices to a suitable recycling center, which must be done with adequate custody measures to ensure the control of the devices.
Cryptography and cryptographic erasure. In recent years devices with built-in encryption, also known as Self-Encrypting Devices (SED), have been released. They have permanent encryption that reduces the likelihood of unencrypted data remaining on the device. Cryptographic erasure consists of leveraging encryption to implement data erasure by removing the encryption key from the device.
This implies that only the encrypted data is kept on the storage medium, preventing its recovery without the key, thus effecting a secure deletion. Its greatest advantage is that it allows a high security cleaning to be carried out in a much faster way. One drawback is that you have to be very careful to ensure that all copies of the encryption keys are removed. Verification of deletion is also complicated because vendors often do not provide information about the technology used to manufacture the controller that is necessary to understand data residue stickiness issues.
All copies of documents authorized for deletion, including backup copies, preservation copies, and electronic backup copies, must be destroyed.
