QMS AND ISMS POLICY

QMS POLICY (ISO 9001:2015)

 

We, at Tocumulus Technology Solutions LLP are driven by a passion for quality and are committed to delivering quality Cloud Services, which meets customer satisfaction through Continual Improvement and Team involvement by implementing best in Technology and Management Practices.

To enhance the satisfaction level of our customers, all interested parties and to consistently exceed their expectations by:

        Being responsive to internal and external issues which influence our organizational performance.

        Effective monitoring, transparent operations, and continued interactions with the stakeholders at large.

        Ensuring effective implementation and continual improvements of “Quality Management System” through periodic reviews.

        Developing Employee skill through training and teamwork.

        Ensuring compliance to all applicable statutory and regulatory requirements.

This policy shall form the basis of establishing Quality Objectives at all levels, and by its implementation we are committed to carrying out our business in a professional manner.

 

                                                                                                         ISMS POLICY (27001:2013)

 

ISMS policy of Tocumulus Technology Solutions LLP:

·         Ensure Confidentiality, Integrity, and Availability by adequately protecting the information and information systems against unauthorized access, modification, or alteration.

·         Establish and implement security policies and processes while considering the protection of information and information systems from internal and external threats.

·         Comply with all legal requirements, codes of practice, contractual security obligations, and all other requirements applicable to our activities

·         Ensure security awareness and competency amongst associates to enable them to meet their security obligations.

·         Provide a framework to manage and handle security breaches, violations, and business disruptions.

·         Ensure continuity of critical operations in line with business and contractual requirements.

·         Ensure continuous improvement of the security posture to consistently meet its Security objectives.

·         Staff with responsibilities for information must ensure the classification of that information, must handle in accordance with its classification level, and must abide by any contractual requirements, policies, procedures, or systems for meeting those responsibilities.