Οικονόμου 18 - Αθήνα
Ανοιχτά από τις 08:30-16:30 μμ.
Επικοινωνήστε Δευτέρα - Παρασκευή: 08:30 - 16:30
18 Oikonomou 18 - Athens
Open from 08:30-16:30 pm.
Contact Monday - Friday: 08:30 - 16:30

Quality management systems

Quality management systems

The company has installed and maintains since 2003 a Quality Management System (QMS) certified according to the international standard ISO 9001:2000.

Taking into account our high sense of responsibility towards our customers, as well as our business strategy to stay ahead of developments, we decided to incorporate the requirements of an Information Security Management System (ISMS), as defined in the International Standard ISO/IEC 27001:2005.

Under the security policy, a security plan and a disaster recovery plan and an emergency plan have been developed.

Information security policy: It is the set of rules that precisely define the role of each stakeholder within the company, their responsibilities, accountabilities and duties in relation to the provision of the service.

Service: the set of activities that the company undertakes to carry out against compensation and in accordance with the other terms of the relevant contract signed by the company with the owner of the information, which include the receipt, transport, loading/unloading, storage, safekeeping, maintenance, management and destruction of the information.

Information: Contractual or non-contractually documented data containing “Personal Data” as defined in Article 2, Chapter A of L. 2471/1997. Personal Data concerning the personnel employed by the company are excluded.

Note: In contracts, the information is usually referred to as a “record”.

Owner of the information: Any person with whom the Company enters into a contract for the provision of the Service and who is defined as a “Data Controller” in Article 2, Chapter A of L. 2472/1997.

Notes: The company undertakes not to accept any contractual term that violates the aforementioned laws and regulatory framework.

Objective: The company aims to provide services in accordance with the applicable legal and regulatory framework and its other contractual obligations, ensuring the protection of information from intentional or unintentional theft, destruction or misuse in violation of laws and regulations.

Skip to content