Quality Policy

    In the field of Information Technology Services:
  • to meet the needs and expectations of our customers with the most appropriate end-to-end service solutions,
  • to contribute to our customers being more competitive,
  • to ensure efficiency,
  • to increase employee and customer satisfaction,
  • to retain customers.

Service Management Policy

    Our main areas of activity include:
  • on-site or field support services,
  • post-sale warranty services,
  • managed services,
  • project, installation and consulting services,
  • and outsourcing services, and in accordance with our vision to become “the leading IT service provider in supporting, operating and managing information and communication technologies” nationally and regionally:
  • to meet the needs and expectations of our customers with the most appropriate end-to-end service solutions,
  • to contribute to our customers being more competitive,
  • to follow project management methodology in project-based jobs and service management best practices in contract-based services,
  • to continuously monitor, measure and improve our service performance using external (customer expectations, contract terms, etc.) and internal (efficiency, capacity planning, resource utilization, etc.) service levels and operational metrics,
  • support our operations with infrastructure that suits our process-oriented methods of doing business,
  • to increase employee and customer satisfaction,
  • to ensure satisfaction, trust and development of all stakeholders with our experienced and certified service team and our exceptional operational execution and management skills,
  • to retain customers.

Information Security Policy

  • To protect the company’s information assets against all internal or external threats that may occur intentionally or unintentionally,
  • to prevent unauthorized access by persons who would breach the confidentiality and the integrity of data,
  • to ensure access to information in accordance with business processes,
  • to fulfill obligations from legal regulations, contract security clauses and business needs,
  • to prepare, maintain and test business continuity plans,
  • to raise information security awareness by training all personnel,
  • to create and maintain risk management plans,
  • to report all existing or suspected vulnerabilities to the Information Security Manager and to ensure they are investigated,
  • to meet the business needs for information systems and accessibility of information.