Information Security
The protection of our customers’ information from unauthorized access , use, disclosure, amendment or destruction, is of utmost importance for us. The control of our systems are implemented in such a way , so as to be sure that all basic principles of data safety are followed as well as confidentiality, integrity and discretion are ensured for our clients. Our control system is formed by the following procedures:
-
Signed confidentiality statements of our employees,
-
separation of duties,
-
a common corporate security policy,
-
password complexity
-
and finally to access our accounting Portal a dual certification is required through symbolic IDs and passwords
Likewise, we carry out various technical controls during which the software and data are used so as to monitor and control the access to information systems. These controls include the use of passwords , innovative firewall, an intrusive detection system to the network, antivirus and anti-spyware, access control lists as well as data encryption which are transferred by external partners. Additionally, we fulfill several physical controls in order to monitor and control the working environment and the technological information instalments.