BeClever S.A. operates under ISO 9001 certification since 2013 and under ISO 27001 certification since 2024. Having these certifications is relevant for clients seeking reassurance when hiring a top-quality service. Our processes are monitored on a daily basis through the BeClever S.A. Processes Department.

BeClever S.A. assumes the following commitments:

Quality and Information Security Policies

To meet the requirements

  • Agreed with customers.
  • Legal and regulatory requirements that may be applicable.
  • From relevant interested parties.
  • Standard 9001:2015.
  • Standard 27001:2022.

To satisfy its customers in a profitable framework.

To continuously improve the processes that make up the Integrated Management System

  • Performance of BeClever S.A.’s personnel and suppliers that
    interact with our task tracking system.
  • Promote the periodic review of all elements of the Integrated Management System in order to Management System to achieve the implementation of a continuous improvement process.

To ensure staff competencies

  • Internal trainings.
  • Disseminate and promote the culture of IT security among the organization’s
    members of the organization and third party partners.
  • Checking of competences, since quality and security is everyone’s task.
    everyone.
  • Follow-up and control of our personnel.

Disaster Recovery Policy

  • Defines procedures for restoring critical information and systems in the event of a disaster.
  • Establishes a disaster recovery plan that includes risk identification, business impact assessment, recovery strategy and plan testing.
  • Assigns responsibilities for the execution of the disaster recovery plan.

Information Asset Classification Policy

  • Classifies the organization’s information assets according to their value and confidentiality.
  • Defines the security controls necessary to protect each class of information asset.
  • Implements a labeling system to identify information assets according to their classification.

Access Control Policy​

  • Controls access to the organization’s information and systems.
  • Defines who can access what information and when.
  • Uses authentication and authorization mechanisms to verify the identity of users.
  • Logs and monitors access to information and systems.

Cryptographic Controls Policy

  • Protects confidential information through the use of cryptography.
  • Defines cryptographic algorithms and keys to be used.
  • Manages cryptographic keys securely.
  • Controls the distribution and use of cryptographic software.

Software Development and Acquisition Policy

  • Ensures that software developed or acquired by the organization complies with information security requirements.
  • Defines a secure software development process that includes risk analysis, secure coding, testing and validation.
  • Establishes security criteria for software acquisition.

Policy for Relations with External Third Parties in IT Services

  • Ensures that IT service providers comply with the organization’s information security requirements.
  • Defines the security controls to be implemented in relationships with external third parties.
  • Monitors IT service providers’ compliance with security requirements.

Information Security Compliance Policy

  • Ensures compliance with information security laws, regulations and standards applicable to the organization.
  • Defines processes to identify, evaluate and comply with information security requirements.
  • Establishes an audit and monitoring program to verify compliance with information security policies.

IT Operations Policy

  • Defines the procedures for the management and operation of the organization’s information systems.
  • Establishes controls to ensure the security, integrity and availability of information.
  • Defines the processes for security incident management, problem resolution and change management.

Network and Communications Policies

  • Protects the organization’s networks and communications against threats and attacks.
  • Defines security controls for networks, network devices and network applications.
  • Implements security measures to protect sensitive communications.

Physical and Environmental Security Policy

  • Protects the organization’s information assets against physical threats.
  • Defines security controls for physical facilities, physical access and environmental security.
  • Implements security measures to protect information assets against theft, fire, natural disasters and other physical threats.

Policy Oriented to the People Department and their Collaborators

  • Sensitizes and trains the organization’s employees in information security.
  • Defines the roles and responsibilities of employees regarding information security.
  • Establishes procedures for the management of information security risks associated with employees.

Mobile Devices Policy

  • Protects the organization’s information that is stored or processed on mobile devices.
  • Defines security controls for mobile devices, mobile applications and mobile networks.
  • Implements security measures to protect mobile devices against loss, theft and unauthorized access.

Security and Privacy Policy in Cloud Services

  • Guarantee the confidentiality, integrity and availability of the information hosted in cloud services.
  • Select reliable and secure cloud service providers.
  • Implement appropriate access controls for information in the cloud.
  • Encrypt confidential information before storing or transmitting it in the cloud.
  • Perform regular backups of information in the cloud.
  • Train users on cloud security risks and best practices.

Anti-Malware Protection Policy

  • Protect the organization’s information systems against malware.
  • Implement anti-malware solutions in all information systems.
  • Keep anti-malware solutions up to date.
  • Perform regular malware scans on all information systems.
  • Train users on risks and best practices for malware protection.

E-Mail Use Policy

  • Ensure responsible and secure use of e-mail.
  • Use strong passwords for e-mail accounts.
  • Do not open suspicious e-mails or attachments.
  • Do not forward confidential information via e-mail.
  • Delete unwanted e-mails and attachments.
  • Train users on email security risks and best practices.

Security Incident Management Policy

  • Establish a process for identifying, documenting, responding to and recovering from security incidents.
  • Establish a channel for reporting security incidents.
  • Define roles and responsibilities for security incident management.
  • Implement a process for investigating and analyzing security incidents.
  • Develop and implement security incident response plans.
  • Conduct security incident tests and drills.
  • Document and learn from security incidents.

Cookies Policy Page:


Introduction:

Welcome to our Cookies Policy. This page explains how and why we use cookies on our website. By continuing to use our site, you agree to the use of cookies in accordance with this policy.

What are cookies?

Cookies are small text files that are stored on your device when you visit a website. These files contain information that is used to improve the functionality and performance of the site.

Types of Cookies We Use:

Strictly Necessary Cookies:

These cookies are essential so that you can navigate the site and use its main functions. They do not collect information about you that can be used for marketing purposes.

Performance Cookies:

These cookies collect information about how visitors use our site, for example which pages they visit most often. This information helps us improve the efficiency and performance of the site.

Functionality Cookies:

These cookies are used to remember your preferences and improve your user experience. For example, they can remember your username, language, or region.

Advertising Cookies:

We use these cookies to show relevant ads to you. They may also limit the number of times you see an ad and help us measure the effectiveness of our advertising campaigns.

Changes to the Cookies Policy:

We reserve the right to update this cookie policy at any time to reflect changes to our practices and services. We recommend that you review this page periodically to be informed of how we are using cookies.

Thank you for trusting us and for reading our Cookies Policy.

Cookie Consent

To provide you with the best possible experience on our website, we use cookies and similar technologies. By clicking “Accept” below, you agree to the use of these technologies to analyze traffic, personalize content and advertising, and improve your browsing experience.

 

You can review our cookie policies to learn more about how we handle your data and set your cookie preferences at any time from the Cookie Settings page.