This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
ISO Certifications
ISO Certifications
We are proud to announce that we achieved 5 ISO Certifications confirming to our stakeholders the company’s quest for excellence and implementation of best business practices and quality standards.
ISO 9001:2015 ensures the appropriate quality from design through to data migration, digital recording and productive operational support of ready-made and bespoke Software products, according to international standards. This is a certificate that Profile holds for almost 20 years.
ISO 14001:2015 ensures that Profile is able to design, develop and support all its operations by managing its environmental responsibilities in a systematic manner that contributes to the environmental pillar of sustainability.
ISO 22301:2012 recognises the Societal Security – Business Continuity Management Systems- Requirements in every aspect of the company’s operations and ensuring continuity and operability under any type of unforeseen circumstances.
ISO 27001:2013 renewal ensures the compliance to international standards of defining the requirements for information security management that identifies, manages and minimizes the range of threats that concern information and data handling. Its methodology ensures secure management of information, for both the company and its customers’ information assets by applying adequate security controls that safeguard the information assets, thereby establishing a high level of confidence to interested parties.
ISO/IEC 27701:2019 ensures the aknowledgement of global standards regarding a Privacy Information Management System (PIMS). It’s a privacy extension to ISO/IEC 27001 Information Security Management and ISO/IEC 27002 Security Controls, providing the requirements on the protection of privacy, helping both personally identifiable information (PII) processors and PII controllers to put robust data processes and controls in place.