Glass doors of modern office building reflecting male office professional walking a few meters away.

Information Security

We highly appreciate and nurture information security. As a proof of high level information security management system and its continuous development, we have been granted ISO 27001 information security certificate.

 

Principles of Idesco Information Security Policy

Introduction

RFID readers of Idesco Oy secure people, buildings and assets as components integrated into a variety of security systems across both public and private sectors.

We have ISO27001 certificate. That certificate shows our information security management system meets the highest information security requirements, thereby strengthening, on our behalf, our customers’ and their end customers’ information security.

Organisation and responsibilities

Idesco’s information security policy has been approved by company management.

Our information security is both managed and reviewed by company management, our IT security manager and system administrator.

Regular information security trainings are organized for all Idesco personnel, and information security training is integral part of each new employee’s orientation. Entire company’s personnel share responsibility for Idesco information security.

Implementing information security

Information security policy and instructions are provided to all Idesco personnel. Information security reviews and training are organised regularly.

Idesco company management regularly assesses information security risks and their implications, and then take the needed actions prescribed in response to those risk assessments. Both Idesco’s operational principles and its information security policy undergo annual review. Indeed, Idesco’s information security policy is designed to closely address the full range of Idesco operational principles, thereby ensuring robust adherence to it across the entirety of the company’s operations.

Our information security policy controls among others the following:

  • Risk assessment
  • Data classification and data handling
  • Handling of personal data
  • Information security requirements for suppliers
  • Content and organization of information security trainings
  • Monitoring and control
  • Regulation of information security deviations

Information security targets, actions and measures are followed as described here in the operational systems annual plan.

Trusted reader supplier

ISO 27001

Highest level information security

Idesco has received international ISO/IEC 27001 certification proving that our information security management system meets the highest information security requirements. Our ISO/IEC 27001 certifies the span of Idesco operations: products, processes, and our entire organization.

ISO 9001

Highest quality

Idesco was first ISO 9001 quality certified in 1997, ensuring the standard of quality you can expect from Idesco products and services. We’re proud to declare our continued adherence to and exceeding ISO 9001 requirements, your guarantor of the highest Idesco product quality and customer service.

OSDPv2

SIA-certified

Security Industry Association has granted us verification of Idesco’s OSDPv2-compliant products. Device verification by SIA can be vitally important for system integrators because a primary goal of SIA’s OSDP has been to reduce interoperability challenges when systems contain devices from different manufacturers. Additionally, OSDP’s secure, bi-directional data flow enables downstream data file transfers from system hosts, simplifying and speeding onsite device configurations and even firmware updates.

view of futuristic glass-walled office building illuminated by sunset from behind

Contact Us

Name*
This field is for validation purposes and should be left unchanged.