Quality and Information Security Policy
Arturai’s Management Policy is based on the following principles:
- Ensuring customer satisfaction through compliance with service requirements, applicable standards, and legal obligations;
- Establishing partnerships with suppliers, considering them an integral part of the Management System and maintaining ongoing evaluation and qualification of the services provided;
- Engaging all employees in the Management System and being attentive to their needs;
- Ensuring information security and the protection of personal data, safeguarding the rights and duties established by applicable legislation;
- Providing and maintaining the resources necessary for the effectiveness of the Management System;
- Systematically evaluating the results of the Management System implementation, ensuring that all activities operate according to established procedures and continuously improving the system’s effectiveness;
- Ensuring the consistent, secure, and efficient delivery of Information Technology services in accordance with the requirements of the Service Management System, promoting continual improvement of the quality, performance, and availability of the services provided to clients;
- Promoting compliance with applicable legal, regulatory, contractual, and ethical requirements, fostering a culture of integrity, transparency, and accountability throughout all activities, in accordance with the Compliance Management System (DNP TS 4577-1).
This Policy is displayed internally and made available on the company website for all stakeholders.
WE ARE A CERTIFIED COMPANY

Through ISO 9001 certification, we ensure compliance with the standards of this internationally recognized quality management service in order to demonstrate our commitment to service quality and customer satisfaction.

With ISO/IEC 27001 Certification Arturai ensures an international standard on how to manage information security.
ISO/IEC 27001 requires that Arturai:
- Systematically examine the organization's information security risks, taking account of the threats, vulnerabilities, and impacts;
- Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable; and
- Adopt an overarching management process to ensure that the information security controls continue to meet the organization's information security needs on an ongoing basis.