Quality and information security

QUALITY POLICY

We are UNI EN ISO 9001:2015 certified, not just a standard but a way of being.

Doing Quality for us at Blulink is not only at the heart of our software is first and foremost achieving customer satisfaction every day through continuous improvement of our processes and procedures. We constantly monitor our results to cut new ground and achieve excellence from the first customer contact to after-sales support.

In particular, we are certified for:

IAF Sector 33 – Information Technology Sector. It is the specific certification related to information technology consulting and software development services

IAF Sector 35 – Professional Business Services Sector. This is the specific certification for the provision of consulting services to businesses

IAF Sector 37 – Training Sector. This is the certification to ensure the delivery of training courses that is added to the Information Technology sector. With this recognition, Blulink can accredit itself as a professional training institution in the software field, with the possibility of benefiting from incentives and funding from the client

Our Quality Management system is guaranteed and evaluated by a certifying body, which verifies all aspects of our work, always aiming to optimize processes and ensure reproducibility of performance and with it the continuous improvement of quality standards.

 

INFORMATION SECURITY POLICY

We are proud to announce that Blulink has achieved ISO/IEC 27001 certification; the international standard for Information Security Management.

As a software house dedicated to the development of digital solutions for Quality management, we have always adopted rigorous protocols for information security and secure software development; Obtaining ISO/IEC 27001 certification is tangible proof of our continuous commitment to adopting industry best practices and aligning ourselves with the highest international standards.

We strictly follow the core principles of ISMS, which include:

  • Risk Analysis: We perform in-depth risk analyzes to identify and mitigate potential information security threats.
  • Access Control: We implement advanced controls to regulate access to sensitive information, ensuring that only authorized personnel can access it.
  • Continuous monitoring: We maintain constant surveillance to identify and promptly respond to any anomalies or threats.

Read our Information Security Policy