{"id":23056,"date":"2026-02-13T02:29:00","date_gmt":"2026-02-13T07:29:00","guid":{"rendered":"https:\/\/iteraprocess.com\/national-security-scheme-policy\/"},"modified":"2026-04-27T14:51:06","modified_gmt":"2026-04-27T19:51:06","slug":"national-security-scheme-policy","status":"publish","type":"page","link":"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/","title":{"rendered":"National Security Scheme Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"23056\" class=\"elementor elementor-23056 elementor-17008\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b70a3a0 e-con-full e-flex e-con e-parent\" data-id=\"b70a3a0\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-14bd7a8 e-con-full e-flex e-con e-child\" data-id=\"14bd7a8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-902e26c elementor-widget elementor-widget-text-editor\" data-id=\"902e26c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 class=\"header_title\">National <span class=\"title_b\">Security<\/span> <span class=\"title_a\">Scheme Policy <\/span><\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10855f2 e-con-full custom-breadcrumbs-content e-flex e-con e-child\" data-id=\"10855f2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-781fe3f elementor-widget__width-auto custom-breadcrumbs elementor-widget elementor-widget-text-editor\" data-id=\"781fe3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><a href=\"\/\">Home<\/a><\/li><li>National Security Scheme Policy<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87e0332 e-flex e-con-boxed e-con e-parent\" data-id=\"87e0332\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9211e8b elementor-widget elementor-widget-html\" data-id=\"9211e8b\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.page-title-container .page-title{\n    display: block;\n        text-align: center;\n}\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35c4b27 e-flex e-con-boxed e-con e-parent\" data-id=\"35c4b27\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fda6f1f elementor-widget elementor-widget-text-editor\" data-id=\"fda6f1f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Current version:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7bfafa elementor-widget elementor-widget-post-info\" data-id=\"f7bfafa\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-f8dc895 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>13 February, 2026<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae307bd elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ae307bd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"font-family: poppins; text-align: justify;\"><p style=\"font-size: 30px; color: #00607b; font-weight: bold; margin: 0;\">Objective:<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f395389 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f395389\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"font-family: poppins; text-align: justify;\"><p> <\/p><p>ITERA, as a company dedicated to IT consulting and training services, software marketing and cloud services, assumes its commitment to information security, committing itself to its proper management, in order to offer all its stakeholders the greatest guarantees around information security.<br>the security of the information used. For all of the above, the Management establishes the following information security objectives: <\/p><p>\u25cf Provide a framework to increase resilience to provide an effective response.<\/p><p>\u25cf Ensure the rapid and efficient recovery of services, in the face of any physical disaster or contingency that may occur and that would put the continuity of operations at risk<\/p><p>\u25cf Prevent information security incidents to the extent technically and economically feasible, as well as mitigate information security risks generated by our activities.<\/p><p>\u25cf Guarantee the confidentiality, integrity, availability, authenticity and traceability of the Information.<\/p><p>This policy is complemented by the rest of the policies, procedures and documents in force to develop our Integrated Management System (IMS).<\/p><p><b>Scope<\/b><\/p><p>It applies to the iterants of the BU of Spain.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1157cbe e-flex e-con-boxed e-con e-parent\" data-id=\"1157cbe\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e867a60 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e867a60\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"font-family: poppins; text-align: justify;\"><p> <\/p><p>References<\/p><p> <\/p><table class=\"table table-bordered\" style=\"margin-left: auto; margin-right: auto;\"><tbody><tr><td>Royal Decree 311\/2022, of 3 May,<br>regulating the Scheme<br>National Security<\/td><td><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>Development of the National Scheme of<br>Security<\/li><\/ul><\/td><\/tr><tr><td>Regulatory requirements<\/td><td><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>Set of applicable laws and regulations<br>in all the BUs and, specifically, the<br>National Security Scheme<\/li><\/ul><\/td><\/tr><tr><td>Comprehensive Management System Policy<br>for Iterants (SGI)<\/td><td><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>Establishes the principles, commitments<br>and responsibilities of the<br>Itera&#8217;s Integrated Management (IMS),<br>aligned with strategic objectives<br>of the organization.<\/li><\/ul><\/td><\/tr><\/tbody><\/table><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0773b8 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d0773b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"font-family: poppins; text-align: justify;\"><p>Roles and responsibilities<\/p><table class=\"table table-bordered\" style=\"margin-left: auto; margin-right: auto;\"><thead><tr><td>Senior Management<\/td><td><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>Provide the necessary resources for the System<\/li><li>Lead the System<\/li><\/ul><\/td><\/tr><tr><td>Responsible for the<br>Information<\/td><td><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>It determines the requirements for the protection of information (confidentiality, integrity, availability, traceability, authenticity).<\/li><li>Participates in the impact assessment for the ENS categorization and in the acceptance of risks related to the information<\/li><\/ul><\/td><\/tr><tr><td>Service Manager<\/td><td><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>Determines and approves service requirements (including availability\/continuity and applicable security requirements).<\/li><li>Participates in the assessment of the impact of the service for the purposes of ENS categorization.<\/li><li>Prioritise, together with the rest of the managers, the actions necessary to comply with the ENS and validate\/accept residual risks from the service when appropriate.<\/li><\/ul><\/td><\/tr><tr><td>Responsible for<br>Data Protection<br>Personal<\/td><td><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>Advises and informs the controller\/processor and the teams about GDPR\/LOPDGDD obligations and how they translate into requirements for systems and services.<\/li><li>Monitor compliance: internal policies, assignment of<br>responsibilities, awareness\/training and audits related to data protection.<\/li><li>It ensures that the risk and measures are aligned: that the security approach (ENS) covers the requirements of security of the processing (art. 32 GDPR) and that the risk\/control analysis takes into account the nature of the processing (data, categories, scale, etc.).<br>etc.).<\/li><li>Drives privacy by design and by default on relevant changes to the<br>system (new functionalities, integrations, third parties, cloud, transfers), so that changes go through impact assessment\/controls before being implemented.<\/li><li>Advises on breaches or incidents with personal data: assessment, notification criteria, coordination with Security\/System and traceability of decisions in the Committee for the management and coordination of security (ENS Committee).<\/li><\/ul><\/td><\/tr><tr><td>Security Manager<\/td><td><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>Proposes, coordinates and supervises the security framework applicable to the system\/service according to the ENS.<\/li><li>It promotes the preparation and maintenance of safety documentation (policies, regulations, procedures, risk management, etc.).<\/li><li>Coordinates the management of security incidents and the follow-up of corrective actions.<\/li><li>Determines, based on the evaluations made by service\/information managers, the category of the system when applicable.<\/li><\/ul><\/td><\/tr><tr><td>Systems Manager<\/td><td><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>Develops and technically implements the measures and controls necessary to comply with the ENS in the system, and supervise its operation.<\/li><li>It guarantees the safe operation of the system (configuration, changes, vulnerabilities, copies, continuity, monitoring, etc.).<\/li><li>Provides evidence and support to ENS audits\/self-assessments and execute approved corrective actions.<\/li><\/ul><\/td><\/tr><\/thead><\/table><p>Policies<\/p><p>Senior Management is responsible for:<\/p><ul class=\"list_default\" style=\"padding-left: 50px !important; list-style: disc;\"><li>Provide the necessary means and provide your employees with the resources<br>sufficient for their compliance, making them publicly known through<br>this ENS Policy within the IMS.<br>The ENS Committee is responsible for:<\/li><li>To make the most important decisions related to the<br>security, being the executive body with the greatest responsibility within the system<br>information security management system, without having to subordinate its activity to<br>no other element of our company.<\/li><li>To appoint the members of the ENS Committee, which is the only body that can<br>appointing, renewing and dismissing them, being the following members:<br>\u25cb Responsible for the information.<br>\u25cb Responsible for services<br>\u25cb Responsible for security.<br>\u25cb Systems Manager.<\/li><li>Comply with applicable legal requirements and any other requirements of<br>compliance that we voluntarily assume and the commitments acquired with the<br>customers, as well as the continuous updating of them.<\/li><li>Preserve the interests of its key stakeholders (customers,<br>shareholders, employees and suppliers), the reputation, brand and activities of<br>value creation. The Security Officer is responsible for:<\/li><li>Identify potential threats as well as the impact on operations of<br>business that such threats, if they materialize, may cause.<\/li><li>Continuously improve our information security system.<\/li><li>Record and manage incidents or breaches considered to be any<br>event, failure, deviation, unplanned situation that interrupts, degrades, or may<br>disrupt confidentiality, integrity or availability, regulatory compliance,<br>ethical and safety guidelines.<\/li><li>Manage the information system, which will be available in a repository, by<br>which can be accessed according to the access profiles granted according to our<br>current access management procedure.<\/li><li>Evaluate and guarantee the technical competence of the personnel, as well as ensure the<br>adequate motivation of the latter for their participation in the continuous improvement of<br>our processes, providing training and internal communication<br>adequate for them to develop good practices defined in the system.<p>The Information Officer is responsible for:<\/p><\/li><li><p>Ensure continuous analysis of all relevant processes,<br>establishing the pertinent improvements in each case, depending on the results<br>obtained and the established objectives.<\/p><\/li><li><p>Guarantee the correct state of the facilities and the appropriate equipment,<br>in such a way that they are in correspondence with the activity, objectives and goals of the<br>company.<br>The Service Manager is responsible for:<\/p><\/li><li><p>Work together with our suppliers and subcontractors with the<br>in order to improve IT service delivery, service continuity, and<br>information security, which have an impact on the greater efficiency of our<br>activity.<br>The Systems Manager is responsible for:<\/p><\/li><li><p>Ensure the correct operation, maintenance and availability of the<br>information.<\/p><\/li><li><p>Implement and manage technical controls, including profiles and permissions for<br>access, in accordance with current security policies.<br>The Personal Data Protection Officer is responsible for:<\/p><\/li><li><p>Manage incidents or breaches of personal data, considered as<br>any event, failure, deviation, unplanned situation that interrupts, degrades<br>or may disrupt confidentiality, integrity or availability,<br>regulations, ethical and safety guidelines.<\/p><\/li><li><p>Ensure compliance with personal data protection regulations,<br>advising on its correct application in systems and processes.<\/p><\/li><li><p>Oversee risk management, protection measures and data processing<br>personnel, including staff training and awareness.<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>National Security Scheme Policy Home National Security Scheme Policy Current version: Objective: ITERA, as a company dedicated to IT consulting and training services, software marketing and cloud services, assumes its commitment to information security, committing itself to its proper management, in&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"inline_featured_image":false,"_joinchat":[],"footnotes":""},"categories":[],"tags":[],"class_list":["post-23056","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>National Security Scheme Policy - Itera Process<\/title>\n<meta name=\"description\" content=\"National Security Scheme Policy. The Security Management and Coordination Committee is the body with the greatest responsibility within the information security management system\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National Security Scheme Policy\" \/>\n<meta property=\"og:description\" content=\"National Security Scheme Policy. The Security Management and Coordination Committee is the body with the greatest responsibility within the information security management system\" \/>\n<meta property=\"og:url\" content=\"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Itera Process\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IteraBusinessProcess\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T19:51:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/\",\"url\":\"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/\",\"name\":\"National Security Scheme Policy - Itera Process\",\"isPartOf\":{\"@id\":\"https:\/\/iteraprocess.com\/#website\"},\"datePublished\":\"2026-02-13T07:29:00+00:00\",\"dateModified\":\"2026-04-27T19:51:06+00:00\",\"description\":\"National Security Scheme Policy. The Security Management and Coordination Committee is the body with the greatest responsibility within the information security management system\",\"breadcrumb\":{\"@id\":\"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/iteraprocess.com\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"National Security Scheme Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/iteraprocess.com\/#website\",\"url\":\"https:\/\/iteraprocess.com\/\",\"name\":\"Itera Process\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/iteraprocess.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/iteraprocess.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/iteraprocess.com\/#organization\",\"name\":\"Itera Process\",\"alternateName\":\"IT ERA\",\"url\":\"https:\/\/iteraprocess.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png\",\"contentUrl\":\"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png\",\"width\":1200,\"height\":1200,\"caption\":\"Itera Process\"},\"image\":{\"@id\":\"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/IteraBusinessProcess\",\"https:\/\/www.linkedin.com\/company\/itera-process\"],\"description\":\"Somos especialistas en proyectos complejos de Cloud, Workflow Automation, AI y Data. Aceleramos la transformaci\u00f3n digital de las empresas con un enfoque estrat\u00e9gico, \u00e1gil y centrado en resultados.\",\"email\":\"info.mx.df@iteraprocess.com\",\"telephone\":\"52553300 0650\",\"legalName\":\"IT ERA SA de CV\",\"foundingDate\":\"2001-01-30\",\"vatID\":\"ESB85261071\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"201\",\"maxValue\":\"500\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"National Security Scheme Policy - Itera Process","description":"National Security Scheme Policy. The Security Management and Coordination Committee is the body with the greatest responsibility within the information security management system","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"National Security Scheme Policy","og_description":"National Security Scheme Policy. The Security Management and Coordination Committee is the body with the greatest responsibility within the information security management system","og_url":"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/","og_site_name":"Itera Process","article_publisher":"https:\/\/www.facebook.com\/IteraBusinessProcess","article_modified_time":"2026-04-27T19:51:06+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/","url":"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/","name":"National Security Scheme Policy - Itera Process","isPartOf":{"@id":"https:\/\/iteraprocess.com\/#website"},"datePublished":"2026-02-13T07:29:00+00:00","dateModified":"2026-04-27T19:51:06+00:00","description":"National Security Scheme Policy. The Security Management and Coordination Committee is the body with the greatest responsibility within the information security management system","breadcrumb":{"@id":"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/iteraprocess.com\/en\/national-security-scheme-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/iteraprocess.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"National Security Scheme Policy"}]},{"@type":"WebSite","@id":"https:\/\/iteraprocess.com\/#website","url":"https:\/\/iteraprocess.com\/","name":"Itera Process","description":"","publisher":{"@id":"https:\/\/iteraprocess.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/iteraprocess.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/iteraprocess.com\/#organization","name":"Itera Process","alternateName":"IT ERA","url":"https:\/\/iteraprocess.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/","url":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png","contentUrl":"https:\/\/iteraprocess.com\/wp-content\/uploads\/2026\/03\/2.png","width":1200,"height":1200,"caption":"Itera Process"},"image":{"@id":"https:\/\/iteraprocess.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IteraBusinessProcess","https:\/\/www.linkedin.com\/company\/itera-process"],"description":"Somos especialistas en proyectos complejos de Cloud, Workflow Automation, AI y Data. Aceleramos la transformaci\u00f3n digital de las empresas con un enfoque estrat\u00e9gico, \u00e1gil y centrado en resultados.","email":"info.mx.df@iteraprocess.com","telephone":"52553300 0650","legalName":"IT ERA SA de CV","foundingDate":"2001-01-30","vatID":"ESB85261071","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"201","maxValue":"500"}}]}},"_links":{"self":[{"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/pages\/23056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/comments?post=23056"}],"version-history":[{"count":3,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/pages\/23056\/revisions"}],"predecessor-version":[{"id":30815,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/pages\/23056\/revisions\/30815"}],"wp:attachment":[{"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/media?parent=23056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/categories?post=23056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iteraprocess.com\/en\/wp-json\/wp\/v2\/tags?post=23056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}