top of page
At Work

Equals quality

logoSAC2.png
52202-SAC Projects and Services - CMMI D
52202-SAC Projects and Services - CMMI S

Effective Computer Solutions  is certified in the CMMI version 2 quality model, maturity level 3 for software development, and CMMI Maturity Level 3 for services.

The model is widely used globally and is recognized as a standard in the industry, mainly IT. This model ensures the quality of our products and services, seeking the continuous improvement of the company through the analysis and design of the processes of the organization, to deliver the SAC product of optimal quality and meet the expectations and needs of our customers.

Information Security Policy

Effective Computer Solutions based on the ISO 27001 standard defines as the policy of the information security management system, safeguard the data of the company and our customers in the process of installation, implementation, support, and maintenance of the SAC collection management system, ensuring the confidentiality, integrity, and availability of the information that is manipulated in the system and the company, both for our customers as for our organization. In this sense, it implements and carries out the best practices to ensure information related to the processes and products that allow the provision of our services.

Effective Computer Solutions is committed to the provision of the necessary resources and the continuous improvement of these practices through the periodic review of its processes at least twice a year, risk management, training, and continuous updating of its entire work team and information security policies, which in turn is responsible for compliance with this policy, satisfying the applicable legal and regulatory requirements, and the contractual requirements and expectations of our clients. See Policy.

 

Information Security Objectives
  • Demonstrate to our customers and suppliers the commitment and seriousness with which we manage and/or administer information security

  • Ensure information security management through best practices implemented in our company

  • Protect and ensure the confidentiality of data and information

  • Preserve the integrity of data and information

  • Implement a Business Continuity Plan that allows you to continue delivering products and services in the event of a disruptive incident

  • Ensure the management of access to information

  • Ensure the availability of data and information

  • Verify the effective functioning of the ISMS through indicators and audits

  • Protect information transferred between the organization and external parties and viceversa

 

Scope

The scope of the Information Security Management System (ISMS) of Effective Computer Solutions is established as all processes, products, and services related to the installation, implementation, support, and maintenance of the SAC collection management system

 

bottom of page