AD OPERATION EXPERTS S.M.P.C. with the trade name ADOPS provides:
- Services for the Design and Development of Information Technology Technologies for Applications.
- Consulting Services for Systems and Software Issues.
- Data Processing Services, Provision of Central Computer, Application Operation, and Provision of Other Information Technology Infrastructure.
For ADOPS, Information Security is a top priority in order to:
- Ensure the company's full compliance with relevant legal and regulatory requirements.
- Protect the interests of the company and those who transact with it and trust it for the use and processing of their confidential data.
- Ensure the availability, integrity, and confidentiality of information generated, received, and transmitted within the scope of projects.
- Maximize the reliability of the company's information resources.
The implementation of the Information Security Management System (ISMS) applied by the company aims at the following:
- Protection of the stored archive, computing resources, and transmitted information in the company's provided services from any deliberate or accidental internal or external threat.
- Systematic assessment and evaluation of risks related to information security, with a view to their correct and timely management.
- Data archiving, avoidance of viruses and external intrusions, access control to systems, recording of all security incidents, and management of unexpected developments.
- Continuous updating of the management and staff on information security issues and the conduct of educational seminars for the personnel.
- Full commitment of the company's Management to the faithful application and continuous improvement of the Information Security Management System, which complies with the requirements of the ISO 27001:2013 standard.
The Information Security Management Representative is responsible for monitoring and overseeing the operation of the Information Security Management System (ISMS), as well as for informing all relevant personnel about the Information Security Policy. All personnel involved in the activities and processes described and related to Information Security are responsible for implementing the policy and the corresponding ISMS Procedures in their area of work. The Management and all employees are committed to achieving the company's goals and adhering to the principles related to Information Security. To achieve the above, the Company applies an Information Security Management System according to the ISO 27001:2013 standard.