Congratulations to 100% for successfully passing the information security management system certification

2022/12/27 16:43

On December 23, 2022, after two stages of audit by the certification body, 100 Fen Information Technology Co., Ltd. successfully passed the information security management system certification and successfully obtained the information security management system certification.

In the future, in the process of language service, operation management and project service, the company will further implement the standardization of enterprise information security management in accordance with the requirements of the information security management system standards, and strengthen employees' awareness of security protection in language services, information services and customer information. To provide customers with safe and reliable language services, further improve customer satisfaction with information services, and achieve standard, safe and sustainable development of the company's informatization work.

232322.jpg


Information Security Management System (ISMS, Information Security Management System) is a framework of policies, procedures, guidelines and related resources for establishing, implementing, operating, monitoring, reviewing, maintaining and improving information security for any type of organization. ISMS is a new concept in the field of information security developed from the United Kingdom around 1998. It is the application of management system (Management System, MS) ideas and methods in the field of information security.

ISMS has become an international standard recognized by the International Organization for Standardization. The ISO/IEC 27000 series of standards defines the requirements for an information security management system (ISMS) and lays the foundation for the certification of an information security management system. In recent years, with the formulation and revision of ISMS international standards, ISMS has been rapidly accepted and recognized by the world, and has become an effective method for solving information security problems for organizations of various types and sizes in all countries in the world.