Thank you for

Reaching out!

We have received your inquiry and our team will get back to you as soon as possible.

zeleros

Information Security Policy

ZELEROS is an organization focused on providing technological solutions that promote the advancement of electric and automated mobility. To this end, it offers its clients the development of customized batteries specifically designed for vehicles that do not conform to conventional standards, thereby addressing specific needs and contributing to more efficient and sustainable mobility.
ZELEROS’ commitment is not limited solely to innovation and technological development. The organization also works actively to ensure that all its assets, as well as those of its clients, are properly protected. To achieve this goal, ZELEROS implements a set of measures, controls, procedures, and actions aimed at safeguarding all the Organization’s assets. This protection covers both the information and the processes that support it, as well as the systems and networks that sustain them. To accomplish this, policies, practices, procedures, organizational structures, and software functions are established to ensure the protection, integrity, and availability of strategic resources and data.

The Information Security Policy is based on the following principles, and Management has made the commitment to:
– Understand the needs of interested parties and meet their requirements, always striving to exceed their expectations.

– Comply with applicable legislation, regulations, and stakeholder requirements, going beyond minimum legal standards whenever economically and technologically feasible.

– Promote training and awareness actions for employees in order to improve their performance within the organization and ensure their involvement in meeting established objectives and goals.

– Consider management aspects as an integral part of planning processes by periodically setting programs, objectives, and targets that ensure compliance with policy requirements and continuously improve the effectiveness of the management system.

– Protect the organization’s information resources and the technology used for their processing against internal or external, deliberate or accidental threats, in order to ensure confidentiality, integrity, authenticity, traceability, availability, legality, and reliability of information.

– Ensure that continuous improvement is present in all processes.

– Protect information appropriately regardless of how it is presented, stored, or communicated.

– Establish methods for reporting, managing, and recording incidents related to the Information Security Management System (ISMS).

– Define a strict policy for copying and storing information relevant to the Organization. Such storage is carried out under the responsibility of qualified personnel, who are tasked with preserving and maintaining these backup copies in perfect condition, thus safeguarding our competitiveness and autonomy.

– Ensure proper access management to our systems through the implementation of an identification and authentication system, which not only restricts access by third parties but also facilitates employees’ work in a completely secure environment.

– Define operating standards that ensure an appropriate balance between user needs, security requirements, and compliance with applicable laws.

Management extends this commitment to all interested parties to ensure compliance with the guidelines set forth in this policy, which will be reviewed periodically to guarantee that it remains appropriate to the organization’s activities.


Signed by the Management Team

October 2025



Boosting an
electric future

Get in touch!

Where we are

La Marina de Valencia
Muelle de la Aduana S/N
46024, Valencia

Latitude Datasheet

Thanks for your interest. Please fill out the form and download the datasheet