Talent Sourcing & Recruiting Handbook 2022 Free Download x
Quality & Data Protection

Quality and
Data Protection

Use outsourcing with confidence

HOW DOES QX IMPLEMENT AND MAINTAIN THE STRICTEST QUALITY AND DATA PROTECTION CONTROLS?

Quality Management System (QMS)

Quality Management System (QMS)

With a clear emphasis on measuring process effectiveness and performance, QX follows the globally-accepted ISO 9001:2015 quality management system (QMS). In addition to giving us access to industry best practices, the adoption of a BSI-accredited, ISO framework helps us continually monitor and improve our procedures and processes.

To maintain rigorous quality control, we undertake regular training and audits. Our internal auditors verify the efficiency and effectiveness of our procedures and revise them, wherever needed. Moreover, to ensure that business objectives continually feed into our processes we validate our quality management system by third-party auditors.

  1. Our clients feel confident in QX’s ability to deliver services that meet their needs and requirements.
  2. We are better equipped to analyse and understand the efficient use of available resources – materials, processes, workforce, technology and information.
  3. Through our compliance with a quality management system, we display our commitment to quality and excellence to our clients.
QX earned the internationally recognised ISO 27001:2013 certification

Information Security Management System (ISMS)

Following a successful audit by the British Standards Institution (BSI), QX earned the internationally recognised ISO 27001:2013 certification for its information security management system. The British Standards Institute’s ISO 27001:2013 is the current best-in-class standard for Information Security Management Systems.

QX follows security guidelines such as:

  • Data access is restricted to authorized users only
  • All methods of data transfers to external sources are controlled
  • Removable storage devices like pen drives, smartphones, etc. are blocked on workstations
  • Access to Internet sites (email, FTP, online storage etc.) is blocked by the use of an industry class firewall device
  • All workstations are protected by an enterprise-level Antivirus solution, which is continuously updated.
  • All operations areas are protected by a magnetic door locking mechanism with access only to department members.
  • All main doors are manned by security officers, with 24×7 CCTV camera monitoring
  • Users are periodically made aware of IT policies and security measures

QX recognises the need for such certification and acknowledges that ISO 27001:2013 indeed ensures appropriate controls to securely protect information and intellectual property. As an ISO 27001:2013 compliant organisation, we treat information as the most valuable asset and continually assesses our systems to ensure the highest level of information security.

Privacy Information Management System (PIMS)

QX has now started to establish and grow its business across different countries, and considering the diversity of stringent privacy law requirements, it was imperative for us to implement controls and measures that are in alignment with these requirements. That’s where QX implemented the ISO 27701 standard for global privacy management followed by a successful audit by the BSI.

ISO 27701 is the best practice structure for a privacy information management system that is aligned with the core principles of data protection. It is a privacy extension to the international Information Security Management Standard, ISO 27001. It specifies the requirements for – and provides guidance for establishing, implementing, maintaining and continually improving – a PIMS (Privacy Information Management System). It is based on the requirements, control objectives and controls of ISO 27001, and includes a set of privacy-specific requirements, controls and control objectives.

Cyber Essential Plus Certification

QX Global Group is now Cyber Essential certified, which demonstrates that the company has vigorous IT defences that are designed to contest cyber-attacks. The scheme has been designed by the UK Government to help organisations mitigate internet-based risks.

The five basic controls within Cyber Essentials were chosen because, when properly implemented, they will help to protect against unskilled internet-based attackers using commodity capabilities – which are freely available on the internet. The scheme addresses five key controls (below), that when implemented correctly can prevent 80% of cyber-attacks.

  1. Boundary firewall and gateways
  2. Secure configuration
  3. Malware protection
  4. Patch management

SOC 2

The British Standards Institute (BSI), conducted a very thorough audit of the internal control framework at QX and vetted our system and organization controls that were deployed with respect to the ‘5 trust principles’. The SOC 2 report offers detailed information and assurance vis-à-vis the set of controls in place at QX relevant to aspects such as security, availability, the integrity of the system processing client data and also the confidentiality and privacy of all data processing.

The audit determined that QX is a SOC 2 Type II compliant organization. In SOC 2 parlance, Type I is a description of all the systems deployed by the vendor and the auditor assesses whether the system design is in perfect sync with the required trust principles. Type II goes one step beyond and describes the effectiveness of all the systems that the organization has implemented to meet SOC 2’s trust principles.

 

Download our Privacy Policy here

Privacy Policy

Partner with us for a safe & secure outsourcing experience.

Book a Consultation CALL