What are ISO Quality Standards?
Quality standards are defined as documents that provide requirements, specifications, guidelines, or characteristics that can be used consistently to ensure that materials, products, processes, and services are fit for their purpose.
ISO Standards are a key part of our society as they ensure quality and safety in both products and services in international trade. Businesses benefit from ISO standards as they can help cut costs by improved systems and procedures put in place.
Our Certificates of Qualification For Service
ISO 9001:2015 Quality Management System
ISO 10002:2018 Quality Management – Customer Satisfaction
ISO 14001:2015 Environment Management System
ISO 20000-1:2018 Information Technologies – Service Management System
ISO 22301:2019 Business Continuity Management System
ISO 27001:2013 Information Security Management System
ISO 27701:2019 Personal Data Management System
ISO 45001:2018 Occupational Health and Safety Management System
TSE 13573: Service Qualification Certificate
OUR QUALITY POLICY
About developing and offering software and information technology;
• Is to answer customer’s needs and expectations at upmost satisfaction and deliver products and services on time that will increase productivity.
• Is to maintain customer satisfaction at upmost level by offering strategic management and services and become “Strategic Business Partner” of our customers.
• Is to offer products and services suitable for both national and international requirements.
• Is to keep continuity of servicing and to provide and develop information security.
• Is to maintain continuous rehabilitation and development of our main philosophy by calculating business performances systematically.
• Is to keep our staff’s both personal and professional developments at upmost level.
• Is to build an environment that works with sharing information and team spirit.
Quality Management System is our main policy.
The management of SOFT hereby undertakes that this policy will be conducted and well understood by SOFT’s employees. This policy is a frame of our targets and revised continuously.
OUR ENVIRONMENTAL POLICY
In the scope of developing and presenting solutions for software and information technologies, the main policy for Environmental Management System of SOFT Business Solutions Inc., is as below:
- Using natural resources optimally
- Maintaining the balance of natural life
- Maintaining the quality of air, water, and earth
- Taking all sorts of precautions to prevent environmental pollution
- Reducing the amount of waste
- Making use of recycling in waste management
- Reducing energy consumption
- Complying with relevant laws and regulations related with environment and energy
- Enhancing Environmental Management System steadily
SOFT Management pledges to communicate this policy to all employees, and to make sure that this policy is understood by all employees. This policy constitutes a framework for the targets and is reviewed continuously.
OUR INFORMATION SECURITY POLICY
In developing and presenting solutions for software and information technologies, our main policy of information security is as below:
- To attach number one priority to information security in line with the strategic targets
- In this context, to pledge to take precautions for ensuring confidentiality, integrity, and accessibility of information assets
- Ensuring steady enhancement of the current Information Security Management System, thus minimizing information security risks and losses which may arise
- To manage the risks which threaten information security assets systematically
- To take necessary measures for protecting information assets of the company against all internal or external threats
- To ensure that SOFT employees and external parties such as suppliers, customers, and visitors comply with this policy, along with other policies, procedures, and instructions which enable the implementation of this policy
- To comply with relevant laws and regulations related with information security
- To impose sanctions such as warning, reprimand, and termination of contract, in case of incompliance with information security policies, procedures, and instructions, according to the corporate personnel regulations
- To attach importance to training in order to ensure that all employees and business partners participate in Information Security Management System
SOFT Management pledges to communicate this policy to all employees and to all relevant parties and to make sure that this policy is understood by all parties. This policy constitutes a framework for the targets and is reviewed continuously.
OUR SECURE SOFTWARE DEVELOPMENT POLICY
Our main policy for developing secure software is as below:
• SOFT BUSINESS SOLUTIONS attaches great importance to security at every phase of software development life cycle in line with the strategic targets.
• In this context, SOFT pledges to take all precautions related with security in all work processes of software development life cycle.
• In terms of data protection it is ensured that all sorts of data which is saved or used by applications are closed to access by unauthorized persons.
• It is guaranteed that the personal data which is saved or processed in applications is in compliance with the laws and regulations related with Personal Data Protection Law (PDPL).
• Technical details and daily logs related with errors and unexpected situations are not viewed by end users.
• Sources such as content, indexes, server interfaces, etc., which are linked to applications can not be opened to uncontrolled access.
• Every source which is opened to access is subjected to identification control.
• For access to all sources and pages which are not classified as general, user authentication is performed by the server.
• All successful and unsuccessful login transactions and attempts of access to sources are saved.
• It is ensured that the steps of secure software development are carefully carried out during management of the session which is opened after authentication and which defines the duration of a permission of access.
• HTTPS protocol is used during transfer of critical data between the application and the end user, with respect to communication security.
• Input in all sorts of data entry transactions, which the users carry out via interfaces or which can be accessed by parameters due to system structure in the applications, is controlled.
• All sorts of response objects produced by the applications undergo output coding controls. In compliance with General Data Protection Regulation (GDPR) and Personal Data Protection Law (PDPL), unauthorized persons are prevented from viewing personal data.
• Importance is attached to training in order to ensure that all employees and business partners, who work in software life cycle process, participate in Secure Software Development Policy.
SOFT Management pledges to communicate this policy to all employees, and to make sure that this policy is understood by all employees. This policy constitutes a framework for the targets and is reviewed continuously.
The management and coordination of the leased virtual servers shall be undertaken by SOFT and a standard backup service comprises 4-week reversible daily image backup for all servers.
The software consultancy and trainings given by experienced SOFT personel provide the correct and efficient use of SOFT applications.
Our customers can access SOFT’s Help Desk by phone or e-mail and report a problem, issue a request, or get information. A call record will be opened in SOFT Internal Tracking System for all sorts of calls via telephone by the customer.