top of page

Information Security

The protection of our customers’ information from unauthorized access , use, disclosure, amendment or destruction, is of utmost importance for us. The control of our systems are implemented in such a way , so as to be sure that all basic principles of data  safety are followed as well as confidentiality, integrity and discretion are ensured for our clients. Our control system is formed by the following procedures:

  • Signed confidentiality statements of our employees,

  • separation of duties,

  • a common  corporate security policy,

  • password complexity

  • and finally to  access our accounting Portal a dual certification is  required through symbolic IDs and passwords

 

Likewise, we carry out  various technical  controls during which the software and data  are used so as to monitor and control the access to information systems. These controls include the use of passwords , innovative firewall, an intrusive detection system to the network, antivirus and anti-spyware, access control lists as well as data encryption which are  transferred by external partners. Additionally, we fulfill several physical controls in order to monitor and control the working environment  and the technological  information instalments.

bottom of page