CERTIFICATE
Quality and Information Security
ProISO's Quality and Information Security Systems are certified under the
ISO
9001:2015 and 27001:2022 standards
Since early 2018, ProISO (Samarth Management Private Limited) Team have been implementing Quality
and Information Security Management Systems across all our units. Quality and Information
Security are essential to ensure high quality of services and secure information management
practices to our clients. Our systems encompass all our departments from marketing to
development to support functions and ensure that we monitor key parameters of quality and
information security continually
ISO 9001:2015 & 27001:2022 Certifications
ProISO has been certified by BMG, which is accredited by an American Accreditation Board UAF (IAF
Member) for its quality and information security management systems.
ISMS Scope
The Information Security Management System applies to information assets utilized for provision
of IT Software Solutions.
ISMS security controls are in accordance with Statement Of Applicability Version No. 1.1, Dated
16 Nov. 2023
QMS Scope
Quality Management System applies to the management system utilized for provision of IT Software
Solutions.
Quality Policy
At ProISO, we are committed to delivering high-quality IT software solutions that exceed customer
expectations. Our quality policy revolves around the following principles:
- Customer Satisfaction: We prioritize understanding and fulfilling the needs of our
clients by delivering reliable, efficient, and innovative software solutions.
- Continuous Improvement: We continuously strive to improve our processes,
technologies,
and skills to ensure the highest quality standards in our products and services.
- Compliance and Security: We adhere to industry best practices, standards, and
regulations
to ensure the security, integrity, and confidentiality of our clients' data.
- Team Empowerment: We empower our employees with the necessary resources, training,
and
support to foster a culture of quality excellence and accountability.
- Stakeholder Engagement: We actively engage with our stakeholders, including
clients,
employees, partners, and communities, to understand their evolving needs and expectations,
thereby driving continuous improvement and innovation.
Through these guiding principles, we are dedicated to achieving and maintaining excellence in
every aspect of our operations, delivering value to our customers, and establishing long-lasting
partnerships built on trust and quality.
Information Security Policy
At ProISO, we are committed to delivering highly secure IT software solutions that exceed
customer expectations. Our information security policy revolves around the following principles:
- Protection of Assets: We are committed to safeguarding all information assets,
including client data, proprietary software, and intellectual property, from unauthorized
access, disclosure, and misuse.
- Access Control: Access to sensitive information and systems is restricted to
authorized
personnel only, and access privileges are granted based on the principle of least privilege.
- Data Protection: We implement encryption, access controls, and data classification
measures to ensure the confidentiality, integrity, and availability of data both in transit
and at rest.
- Security Awareness: Regular training and awareness programs are provided to
educate
employees about security best practices and their role in maintaining information security.
- Incident Response: We have a documented incident response plan to detect, respond
to,
and recover from security incidents in a timely and effective manner. All security incidents
are promptly reported, investigated, and remediated.
- Compliance: We comply with all applicable laws, regulations, and industry
standards
related to information security, privacy, and data protection.
- Continuous Improvement: We regularly assess and review our security controls,
conduct
security audits and risk assessments, and implement proactive measures to enhance our
overall security posture.
By adhering to this information security policy, we demonstrate our commitment to protecting
information assets and maintaining the trust and confidence of our clients, partners, and
stakeholders.