{"id":175301,"date":"2026-03-04T14:03:41","date_gmt":"2026-03-04T13:03:41","guid":{"rendered":"https:\/\/www.algorithm-factory.com\/information-security\/"},"modified":"2026-03-04T14:03:41","modified_gmt":"2026-03-04T13:03:41","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.algorithm-factory.com\/en\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;7&#8243; top_padding=&#8221;7&#8243; bottom_padding=&#8221;7&#8243; back_color=&#8221;color-210407&#8243; back_image=&#8221;172038&#8243; overlay_color=&#8221;color-210407&#8243; overlay_alpha=&#8221;75&#8243; overlay_animated=&#8221;yes&#8221; overlay_animated_size=&#8221;0.7&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; bottom_divider=&#8221;gradient&#8221; css_animation=&#8221;scroll-trigger&#8221; animation_state=&#8221;end&#8221; animation_origin=&#8221;center left&#8221; animation_scale_val=&#8221;100&#8243; animation_opacity=&#8221;0&#8243; animation_x=&#8221;0&#8243; animation_y=&#8221;0&#8243; animation_blur=&#8221;0&#8243; animation_rotate=&#8221;0&#8243; animation_perspective=&#8221;0&#8243; animation_offset_top=&#8221;0&#8243; animation_offset_bottom=&#8221;86&#8243; content_parallax=&#8221;3&#8243; uncode_shortcode_id=&#8221;100742&#8243; back_color_type=&#8221;uncode-palette&#8221; overlay_animated_2_color_type=&#8221;uncode-solid&#8221; overlay_animated_2_color_solid=&#8221;#7072e0&#8243; overlay_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;bottom&#8221; gutter_size=&#8221;4&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;138994&#8243;][vc_row_inner limit_content=&#8221;&#8221;][vc_column_inner column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;left&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;9\/12&#8243; uncode_shortcode_id=&#8221;311432&#8243;][vc_custom_heading heading_semantic=&#8221;h1&#8243; text_font=&#8221;font-161747&#8243; text_size=&#8221;fontsize-155944&#8243; text_weight=&#8221;400&#8243; text_space=&#8221;fontspace-111509&#8243; uncode_shortcode_id=&#8221;159813&#8243;]Information Security[\/vc_custom_heading][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_visibility=&#8221;yes&#8221; medium_width=&#8221;0&#8243; mobile_visibility=&#8221;yes&#8221; mobile_width=&#8221;0&#8243; width=&#8221;3\/12&#8243; uncode_shortcode_id=&#8221;161238&#8243;][\/vc_column_inner][\/vc_row_inner][vc_separator sep_color=&#8221;&#8221; full_width=&#8221;yes&#8221; uncode_shortcode_id=&#8221;105882&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;5&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; limit_content=&#8221;&#8221; uncode_shortcode_id=&#8221;157228&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_visibility=&#8221;yes&#8221; medium_width=&#8221;0&#8243; mobile_visibility=&#8221;yes&#8221; mobile_width=&#8221;0&#8243; width=&#8221;6\/12&#8243; uncode_shortcode_id=&#8221;177579&#8243;][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;6\/12&#8243; uncode_shortcode_id=&#8221;202754&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;5&#8243; top_padding=&#8221;7&#8243; bottom_padding=&#8221;7&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;5&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; top_divider=&#8221;gradient&#8221; bottom_divider=&#8221;gradient&#8221; inverted_device_order=&#8221;yes&#8221; content_parallax=&#8221;0&#8243; uncode_shortcode_id=&#8221;815365&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_horizontal=&#8221;left&#8221; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; css_animation=&#8221;alpha-anim&#8221; animation_speed=&#8221;1600&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;154073&#8243;][vc_custom_heading heading_semantic=&#8221;div&#8221; text_size=&#8221;&#8221; text_weight=&#8221;400&#8243; text_height=&#8221;fontheight-357766&#8243; uncode_shortcode_id=&#8221;862132&#8243;]MCP specializes in reducing avoidable waste in industry. Our goal is to help reduce environmental impact through smarter planning. Supply chain planning and detailed production planning are ideal disciplines for achieving this. The information processed in these areas is among our clients\u2019 most valuable assets and must be protected accordingly.   <\/p>\n<p>&nbsp;<\/p>\n<p>For this reason, management has decided to implement an Information Security Management System (ISMS) in accordance with ISO 27001, which meets the requirements regarding the confidentiality, integrity, and availability of the information processed.<\/p>\n<p>The goal is to establish an appropriate level of information security, identify potential threats, and mitigate them to an acceptable level through appropriate measures, as well as to identify and transparently accept any remaining residual risks. All measures should be tailored to the necessary protection requirements of the respective information from an economic perspective and aligned with the corporate strategy. <\/p>\n<p>&nbsp;<\/p>\n<p>In implementing the ISMS, we are committed to<strong> raising and gradually improving<\/strong><strong> awareness of information security<\/strong> among all individuals who contribute to the effectiveness of the security measures in place. All individuals are made aware of, educated, and trained in accordance with their responsibilities, roles, and tasks, taking into account the prior knowledge of the target group (e.g., top management, executives, functional departments, IT, and external parties) and ensuring that the content is tailored and communicated appropriately for each group. <\/p>\n<p>To ensure information security, the IT infrastructure and processes used to process information must also meet security requirements. The necessary IT security measures are determined on a risk-based approach, taking into account the current state of the art. <\/p>\n<p>&nbsp;<\/p>\n<p>The following section outlines the key elements of the ISMS:<\/p>\n<ul>\n<li>Conducting an environmental analysis that takes into account business operations and the requirements of stakeholders<\/li>\n<li>Promoting a strong safety culture across all areas<\/li>\n<li>Establishment of an effective organizational structure led by a CISO with sufficient authority, the necessary financial resources, and appropriate personnel resources.<\/li>\n<li>Establishment of an opportunity and risk management system.<\/li>\n<li>Establishing specific and measurable information security objectives<\/li>\n<li>Clearly defined communication structures<\/li>\n<li>Establishment of the necessary process organization<\/li>\n<li>Preparation and management of all relevant documents<\/li>\n<li>Measuring Goal Achievement Using Key Performance Indicators<\/li>\n<li>Regular assessment of the design effectiveness and operational effectiveness of measures<\/li>\n<li>Direct reporting line between the CISO and senior management<\/li>\n<li>Annual assessment of effectiveness by management<\/li>\n<li>Defining and tracking actions to correct nonconformities and implement improvement measures<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>To ensure optimal information security, we are committed to:<\/p>\n<ul>\n<li>Regular information security training for all employees<\/li>\n<li>Planning and Implementation of IT Changes<\/li>\n<li>Comprehensive IT security for all end devices in use<\/li>\n<li>Regular updates to the software in use<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Senior management <strong>bears overall responsibility for the ISMS<\/strong>, is <strong>explicitly committed to continuous improvement,<\/strong> and promotes and supports all necessary activities and measures.<\/p>\n<p>Information security is not solely the responsibility of senior management. All employees are obligated to protect information and to accept the additional effort required to comply with established security measures in the best interests of the company as a whole. In particular, managers are responsible for ensuring compliance with established policies and procedures within their respective areas.  [\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;7&#8243; top_padding=&#8221;7&#8243; bottom_padding=&#8221;7&#8243; back_color=&#8221;color-210407&#8243; back_image=&#8221;172038&#8243; overlay_color=&#8221;color-210407&#8243; overlay_alpha=&#8221;75&#8243; overlay_animated=&#8221;yes&#8221; overlay_animated_size=&#8221;0.7&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; bottom_divider=&#8221;gradient&#8221; css_animation=&#8221;scroll-trigger&#8221; animation_state=&#8221;end&#8221; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-175301","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security MCP GmbH | Data &amp; System Protection<\/title>\n<meta name=\"description\" content=\"Information Security at MCP GmbH. Learn how we reliably protect data, systems, and processes and ensure the highest security standards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.algorithm-factory.com\/en\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security MCP GmbH | Data &amp; System Protection\" \/>\n<meta property=\"og:description\" content=\"Information Security at MCP GmbH. Learn how we reliably protect data, systems, and processes and ensure the highest security standards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.algorithm-factory.com\/en\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"algorithm-factory\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/information-security\\\/\",\"url\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/information-security\\\/\",\"name\":\"Information Security MCP GmbH | Data & System Protection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/#website\"},\"datePublished\":\"2026-03-04T13:03:41+00:00\",\"description\":\"Information Security at MCP GmbH. Learn how we reliably protect data, systems, and processes and ensure the highest security standards.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/information-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/\",\"name\":\"MCP Algorithm Factory\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/#organization\",\"name\":\"MCP GmbH\",\"alternateName\":\"MCP\",\"url\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.algorithm-factory.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/logo_mcp_algorithm_factory_vertikal_transparent_reine_web_u_beameranwendung.png\",\"contentUrl\":\"https:\\\/\\\/www.algorithm-factory.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/logo_mcp_algorithm_factory_vertikal_transparent_reine_web_u_beameranwendung.png\",\"width\":340,\"height\":170,\"caption\":\"MCP GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.algorithm-factory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mcp-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security MCP GmbH | Data & System Protection","description":"Information Security at MCP GmbH. Learn how we reliably protect data, systems, and processes and ensure the highest security standards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.algorithm-factory.com\/en\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information Security MCP GmbH | Data & System Protection","og_description":"Information Security at MCP GmbH. Learn how we reliably protect data, systems, and processes and ensure the highest security standards.","og_url":"https:\/\/www.algorithm-factory.com\/en\/information-security\/","og_site_name":"algorithm-factory","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.algorithm-factory.com\/en\/information-security\/","url":"https:\/\/www.algorithm-factory.com\/en\/information-security\/","name":"Information Security MCP GmbH | Data & System Protection","isPartOf":{"@id":"https:\/\/www.algorithm-factory.com\/en\/#website"},"datePublished":"2026-03-04T13:03:41+00:00","description":"Information Security at MCP GmbH. Learn how we reliably protect data, systems, and processes and ensure the highest security standards.","breadcrumb":{"@id":"https:\/\/www.algorithm-factory.com\/en\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.algorithm-factory.com\/en\/information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.algorithm-factory.com\/en\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/www.algorithm-factory.com\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.algorithm-factory.com\/en\/#website","url":"https:\/\/www.algorithm-factory.com\/en\/","name":"MCP Algorithm Factory","description":"","publisher":{"@id":"https:\/\/www.algorithm-factory.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.algorithm-factory.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.algorithm-factory.com\/en\/#organization","name":"MCP GmbH","alternateName":"MCP","url":"https:\/\/www.algorithm-factory.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.algorithm-factory.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.algorithm-factory.com\/wp-content\/uploads\/2026\/02\/logo_mcp_algorithm_factory_vertikal_transparent_reine_web_u_beameranwendung.png","contentUrl":"https:\/\/www.algorithm-factory.com\/wp-content\/uploads\/2026\/02\/logo_mcp_algorithm_factory_vertikal_transparent_reine_web_u_beameranwendung.png","width":340,"height":170,"caption":"MCP GmbH"},"image":{"@id":"https:\/\/www.algorithm-factory.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/mcp-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.algorithm-factory.com\/en\/wp-json\/wp\/v2\/pages\/175301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.algorithm-factory.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.algorithm-factory.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.algorithm-factory.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.algorithm-factory.com\/en\/wp-json\/wp\/v2\/comments?post=175301"}],"version-history":[{"count":0,"href":"https:\/\/www.algorithm-factory.com\/en\/wp-json\/wp\/v2\/pages\/175301\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.algorithm-factory.com\/en\/wp-json\/wp\/v2\/media?parent=175301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}