CERTIFICATE
Quality and Information Security
ProISO's Quality and Information Security Systems are certified under the ISO 9001:2015 and 27001:2022 standards
Since early 2018, ProISO (Samarth Management Private Limited) Team have been implementing Quality and Information Security Management Systems across all our units. Quality and Information Security are essential to ensure high quality of services and secure information management practices to our clients. Our systems encompass all our departments from marketing to development to support functions and ensure that we monitor key parameters of quality and information security continually
ISO 9001:2015 & 27001:2022 Certifications
ProISO has been certified by BMG, which is accredited by an American Accreditation Board UAF (IAF Member) for its quality and information security management systems.
ISMS Scope
The Information Security Management System applies to information assets utilized for provision of IT Software Solutions.
ISMS security controls are in accordance with Statement Of Applicability Version No. 1.1, Dated 16 Nov. 2023
QMS Scope
Quality Management System applies to the management system utilized for provision of IT Software Solutions.
Quality Policy
At ProISO, we are committed to delivering high-quality IT software solutions that exceed customer expectations. Our quality policy revolves around the following principles:
- Customer Satisfaction: We prioritize understanding and fulfilling the needs of our clients by delivering reliable, efficient, and innovative software solutions.
- Continuous Improvement: We continuously strive to improve our processes, technologies, and skills to ensure the highest quality standards in our products and services.
- Compliance and Security: We adhere to industry best practices, standards, and regulations to ensure the security, integrity, and confidentiality of our clients' data.
- Team Empowerment: We empower our employees with the necessary resources, training, and support to foster a culture of quality excellence and accountability.
- Stakeholder Engagement: We actively engage with our stakeholders, including clients, employees, partners, and communities, to understand their evolving needs and expectations, thereby driving continuous improvement and innovation.
Through these guiding principles, we are dedicated to achieving and maintaining excellence in every aspect of our operations, delivering value to our customers, and establishing long-lasting partnerships built on trust and quality.
Information Security Policy
At ProISO, we are committed to delivering highly secure IT software solutions that exceed customer expectations. Our information security policy revolves around the following principles:
- Protection of Assets: We are committed to safeguarding all information assets, including client data, proprietary software, and intellectual property, from unauthorized access, disclosure, and misuse.
- Access Control: Access to sensitive information and systems is restricted to authorized personnel only, and access privileges are granted based on the principle of least privilege.
- Data Protection: We implement encryption, access controls, and data classification measures to ensure the confidentiality, integrity, and availability of data both in transit and at rest.
- Security Awareness: Regular training and awareness programs are provided to educate employees about security best practices and their role in maintaining information security.
- Incident Response: We have a documented incident response plan to detect, respond to, and recover from security incidents in a timely and effective manner. All security incidents are promptly reported, investigated, and remediated.
- Compliance: We comply with all applicable laws, regulations, and industry standards related to information security, privacy, and data protection.
- Continuous Improvement: We regularly assess and review our security controls, conduct security audits and risk assessments, and implement proactive measures to enhance our overall security posture.
By adhering to this information security policy, we demonstrate our commitment to protecting information assets and maintaining the trust and confidence of our clients, partners, and stakeholders.