List of Procedures

We maintain a comprehensive set of internal procedures to ensure consistent and secure operations. Below is a list of key documented procedures that govern our platform and services.

Information Security Management System

  • P-01 | Context of the organization

  • P-02 | Leadership

  • P-03 | Planning

  • P-04 | Support

  • P-05 | Operation

  • P-06 | Evaluation of operational effects

  • P-07 | Improvement

Security Management

  • P-08 | Risk management

  • P-09 | Information classification

  • P-10 | Physical security

  • P-11 | Clean desk and screen

  • P-12 | Management of information processing devices

  • P-13 | Management of system authorizations

  • P-14 | User responsibility

  • P-15 | Cryptographic controls

  • P-16 | Data carrier security

  • P-17 | Protection against malware

  • P-18 | Data archiving

  • P-19 | Logging and monitoring

  • P-20 | System configuration

  • P-21 | Technical vulnerability management

  • P-22 | Network security

  • P-23 | Data transmission

  • P-24 | Secure development

  • P-25 | Third-party services

  • P-26 | Information security incident management

Business Continuity Management

  • P-27 | Business continuity

  • P-28 | Redundancy

Personal Data Protection

  • P-29 | Personal data protection

  • P-30 | Data subjects' rights

  • P-31 | Data retention

Last updated