Information and systems are considered valuable Quantexa assets which require protection against varying types of internal and external security risks. These risks have the potential to threaten the confidentiality, integrity, and availability of Quantexa assets.
Quantexa is committed to promoting effective controls across the range of information, technical, personnel, and physical security to maintain the confidentiality of our and our client’s data. We maintain and protect all the information we use or store in a manner that is consistent with our relevant professional, ethical, legal, regulatory, and contractual requirements.
The Quantexa Board and the Senior Management Team, represented by the Head of Information Security and the Information Security Steering Group (ISSG), fully endorse all information security policies and standards, and expect them to be adhered to. Prescribed controls are implemented throughout the organization supporting the continuous review and improvement of the Information Security Management System (ISMS).
To reinforce our commitment to Information Security, Quantexa meets and exceeds the ISO/IEC 27001 standard requirements and has been certified since March 2018. Our framework is regularly assessed to ensure the highest possible level of compliance from an independent external audit.
Information security is at the core of our culture. We ensure that we educate our people and regularly refresh their knowledge so they each have a clear understanding of our expectations, and of the changing nature of the threats to the security of our information.
The ISMS is achieved using various controls that are set out within the various policies, standards, guidelines, processes, and procedures. Conforming with these controls is critical in ensuring that Quantexa meets all its obligations to its stakeholders and clients.
These controls are continually monitored, reviewed, and improved upon to ensure that security and business objectives are met. This is operated in conjunction with other business management processes and incorporates the applicable statutory and contractual requirements.
Please feel free to contact [email protected] if you have any questions surrounding information security.