Blog
Quality and Data Protection

Quality and
Data Protection

Use outsourcing with confidence

 

HOW DOES QX IMPLEMENT AND MAINTAIN THE STRICTEST QUALITY AND DATA PROTECTION CONTROLS?

Quality Management System (QMS)

With a clear emphasis on measuring process effectiveness and performance, QX follows the globally accepted ISO 9001:2015 quality management system (QMS). In addition to giving us access to industry best practices, the adoption of a BSI-accredited, ISO framework helps us continually monitor and improve our procedures and processes.

To maintain rigorous quality control, we undertake regular training and audits. Our internal auditors verify the efficiency and effectiveness of our procedures and revise them, wherever needed. Moreover, to ensure that business objectives continually feed into our processes we validate our quality management system by third-party auditors.

  1. Our clients feel confident in QX’s ability to deliver services that meet their needs and requirements.
  2. We are better equipped to analyse and understand the efficient use of available resources – materials, processes, workforce, technology and information.
  3. Through our compliance with a quality management system, we display our commitment to quality and excellence to our clients.

Information Security Management System (ISMS)

Following a successful audit by the British Standards Institution (BSI), QX earned the internationally recognised ISO 27001:2013 certification for its information security management system. The British Standards Institute’s ISO 27001:2013 is the current best-in-class standard for Information Security Management Systems.

QX follows security guidelines such as:

  • Data access is restricted to authorized users only
  • All methods of data transfers to external sources are controlled
  • Removable storage devices like pen drives, smartphones, etc. are blocked on workstations
  • Access to Internet sites (email, FTP, online storage etc.) is blocked by the use of industry class firewall device
  • All workstations are protected by an enterprise-level Antivirus solution, which is continuously updated.
  • All operations areas are protected by a magnetic door locking mechanism with access only to department members.
  • All main doors are manned by security officers, with 24×7 CCTV camera monitoring
  • Users are periodically made aware of IT policies and security measures

QX recognises the need for such certification and acknowledges that ISO 27001:2013 indeed ensures appropriate controls to securely protect information and intellectual property. As an ISO 27001:2013 compliant organisation, we treat information as the most valuable asset and continually assesses our systems to ensure the highest level of information security.

Cyber Essential Plus Certified

QX is now Cyber Essential certified, which demonstrates that the company has vigorous IT defences that are designed to contest cyber-attacks. The scheme has been designed by the UK Government to help organisations mitigate internet-based risks.

The five basic controls within Cyber Essentials were chosen because, when properly implemented, they will help to protect against unskilled internet-based attackers using commodity capabilities – which are freely available on the internet. The scheme addresses five key controls (below), that when implemented correctly can prevent 80% of cyber-attacks.

  1. Boundary firewall and gateways
  2. Secure configuration
  3. Malware protection
  4. Patch management

Privacy Information Management System (PIMS)

QX has now started to establish and grow its business across different countries, and considering the diversity of stringent privacy law requirements, it was imperative for us to implement controls and measures that are in alignment with these requirements. That’s where QX implemented the ISO 27701 standard for global privacy management followed by a successful audit by the BSI.

ISO 27701 is the best practice structure for a privacy information management system that is aligned with the core principles of data protection. It is a privacy extension to the international Information Security Management Standard, ISO 27001. It specifies the requirements for – and provides guidance for establishing, implementing, maintaining and continually improving – a PIMS (Privacy Information Management System). It is based on the requirements, control objectives and controls of ISO 27001, and includes a set of privacy-specific requirements, controls and control objectives.

SOC 2

The British Standards Institute (BSI), conducted a very thorough audit of the internal control framework at QXAS US and vetted our system and organization controls that were deployed with respect to the ‘5 trust principles’. The SOC 2 report offers detailed information and assurance vis-à-vis the set of controls in place at QXAS relevant to aspects such as security, availability, integrity of the system processing client data and also the confidentiality and privacy of all data processing.

The audit determined that QXAS is a SOC 2 Type II compliant organization. In SOC 2 parlance, Type I is a description of all the systems deployed by the vendor and the auditor assesses whether system design is in perfect sync with the required trust principles. Type II goes one step beyond and describes the effectiveness of all the systems that the organization has implemented to meet SOC 2’s trust principles.

IMPORTANCE OF SOC 2 FOR QXAS CUSTOMERS

We are continuously hearing reports of data breaches in some of the biggest organizations across diverse sectors. Customer data is now a prime currency and criminals are after sensitive customer data including Personally Identifiable Information (PII), financial information and any other information that is valuable to the customer and the organization.

QXAS has earned its SOC 2 report on the back of its focus on ensuring complete data security and seamlessly efficient data management. This means, our clients are rest assured their data is managed securely and will not be accessed in an unauthorized manner.

 

Download our Privacy Policy here

Partner with us for a safe & secure outsourcing experience

Book a Consultation CALL