top of page
POLICY
1. Meet expectations by realizing information system security through the implementation of ISO / IEC 27001: 2013 ISMS
2. With a level of security using two-step authentication
3. With high internal access control
4. Safe backup and storage
bottom of page