© 2022 All Rights reserved Belltech
Chile, Colombia & Perú
In Belltech, we are committed to meeting the applicable requirements of customers and stakeholders, through marketing and service delivery in technology solutions, based on the effectiveness of its processes that contribute to continuous improvement and compliance with the Strategic Direct
Scope of the Quality Management System
Objectives of the Quality Management System
- To achieve the satisfaction of our customers and stakeholders.
- To develop human talent by training it and orienting it towards the permanent search for excellence.
- To implement an effective risk management in the processes that generates continuous improvement of the quality management system.
- Attend and treat all requests, complaints, claims and suggestions we receive.
- To continuously improve the management systems adopted by the company.
Information Security Policy
Chile & Colombia
Upper management is committed to ensure that communications processes, electronic channels and professional services comply with legal, regulatory and contractual requirements, applied to all internal and external customers, projecting their actions in the conservation of its technological resources, infrastructure and information to any incident, through action plans for information security and continuous improvement which focuses on minimizing incidents occurring on computer security, crises or potential risks or happen, these being evaluated and analyzed to generate confidence in the chain of administrative and commercial process for its external and internal customers.
Scope of the Information Security Management System
Objectives of the Information Security Management System
CULTURE: Promote, train and sensitize all our customers, employees, suppliers, contractors, partners and people of interest in general; in the importance of protection and care of the information handled in the company ensuring the integrity, availability and confidentiality.
INCIDENTS: Identify, treat and close in a timely manner the Information Security incidents that occur in the organization.
CONTINUITY: Ensure the continuity of all processes of the organization and comply with the minimum requirements established for its proper function.
RISKS: Control, mitigate and/or prevent risks associated with information security, identifying vulnerabilities and threats facing the most relevant assets for the company, in order to ensure the continuity of the operation.
SEGURITY CONTROLS: Measure, evaluate and monitor the implemented controls, policies and procedures of the ISMS to ensure its proper functioning.
CONTINUOUS IMPROVEMENT: Generate a commitment on the part of the entire company to follow up on the entire information security management system within the framework of continuous improvement.