Information Security Management System
We use an Information Security Management System (ISMS) to translate security principles and risk management into measures and to implement and manage them.
A specially appointed Corporate Information Security Officer (CISO) focuses on the implementation of and compliance to the baseline. The various business units are represented within the security organization by a Security coordinator (SC), while a Security Officer will facilitate the information security process within the system management centers for the concerned activities.
Overall coordination and governance is provided by the information Security Steering Committee, which includes a representation of the board of directors, the CISO, the Privacy Officer and the various security perspectives.
Various business units and processes within Centric are certified according to ISO27001:2013. Also, TPM / ISAE3402 statements are drawn up in consultation with various business units and processes
Attention to privacy
Of course, the privacy of individuals and the protection of personal data are given specific attention at Centric. This attention also aims to comply with the provisions of the General Data Protection Regulation (GDPR).
In our Privacy Statement we explain how we handle your personal data. Our Privacy Officer coordinates, facilitates and monitors efforts and compliance in this context. Do you have any questions regarding privacy? Mail them to firstname.lastname@example.org. We will reply to you as soon as possible!
All our employees are bound by a confidentiality statement regarding confidential information that they obtain during their employment contract.
Information Security Awareness
To achieve an adequate level of security, information security awareness is essential to both management and employees. We therefore pay a lot of attention to this.
Want to know more?
Do you want to know more about how Centric protects your data? Please contact your contact person within Centric or mail to email@example.com.