Information Security Policy
Engaige Technologies, company that offers Generative AI Customer Service services. Establishing as our main objective, the satisfaction of our clients, based on the values of efficiency, seriousness, professionalism, and the execution of quality work with security guarantees, both information and documentation with which we work, as well as the data.
This means that both the Management of Engaige Technologies and its staff must apply the established security measures and establish control and monitoring mechanisms for them. To this end, a set of measures, controls, procedures, and actions have been implemented to protect all assets, including the information and processes that support it, as well as the systems and networks. It is important that the principles of the Information Security Policy are part of the organizational culture. For this, a manifest commitment must be ensured by those responsible for each area for the dissemination, consolidation, and compliance of this Policy.
The Management, to guarantee information security, has developed and implemented an information security management system (ISMS), whose main pillars and objectives are:
- Know the needs of our clients and satisfy them.
- Comply with all current legal provisions and enforceable regulations, applying legal compliance to the activities that the company carries out and the requirements required by our clients, even beyond the legal minimums that are economically and technologically viable.
- Establish a continuous improvement system to optimize and increase the quality of our service.
- The Information Security Management System is not a matter of one person but is the result of joint work by all members of the company, who are provided with constant and appropriate training.
- Protect the Company's information resources, and the technology used for their processing, against threats, internal or external, deliberate, or accidental, in order to ensure we protect the confidentiality, integrity and availability of our information.
- Establish methods of notification, management and registration of incidents related to the Information Security Management Systems (ISMS) and carry out a continuous review of said controls to guarantee compliance with security requirements, and in this way contribute to continuous improvement.
- Define a strict policy for copying and storing information relevant to the company.
- Guarantee adequate access management to our systems through the implementation of an identification and authentication system. Which not only restricts access to third parties but also facilitates the work of our employees in a completely safe environment.
- Define standards of action that ensure an adequate balance between the needs of users, security requirements and respect for current laws.
All our personnel must comply with the guidelines, rules, and procedures, and because of this, they will assume the duty of collaboration with this organization in the interest that there are no alterations or violations of these rules.
All people who provide their services at Engaige Technologies must know and assume the obligations regarding the correct use of computer resources. Failure to comply with these obligations by the staff may give rise to disciplinary responsibility, and the exercise of legal procedures by the company for its demand.
Consequently, Management extends this commitment to all employees, as well as to those who act on behalf of Engaige Technologies so that they comply with the guidelines of this policy, which will be reviewed periodically to ensure that they are always appropriate to the activities of the organization.