Cinchis' Security Policy

End-to-End Security Built on Responsibility, Resilience, and Compliance.

Cinchis is a dedicated digital technology and IT support partner for organizations seeking excellence in their digital operations. Since our establishment, we have committed ourselves to providing secure, efficient, trusted, and reliable IT solutions. In the course of our operations, Cinchis interacts with business-critical information and personal data; the protection of this information is paramount to the success of our clients and our reputation as a trusted partner.

Our Security Vision is “To establish Cinchis as a resilient and trusted IT partner, capable of neutralizing evolving cyber threats while ensuring seamless business continuity and absolute data integrity.”

This Security Policy affirms our commitment to safeguarding all assets and information entrusted to us. We strive to provide a secure working environment that meets global standards of safety and professional excellence.

Security Objectives

Cinchis deploys a comprehensive security framework designed to achieve the following:

  • Protection of Assets: Defending information and physical assets against emerging threats through rigorous logical, physical, and personnel security controls.
  • Secure Innovation: Ensuring the safe deployment of modern technologies, including AI-driven support tools and secure remote access protocols.
  • Regulatory Compliance: Strict adherence to legal, statutory, and regulatory requirements.
  • Operational Continuity: Maintaining service availability in line with stakeholder expectations and business obligations.
  • Defined Responsibility: Explicitly detailing the security roles and responsibilities of all employees and associates.
  • Security Competence: Fostering a culture of security awareness at all levels of the organization to ensure every associate acts as a guardian of data.
  • Supply Chain Management: Managing risks associated with third-party vendors and external partners to ensure an end-to-end secure ecosystem.

Implementation and Governance

This Policy is supported by a structured set of Standards, Procedures, and Guidelines. These are available to all stakeholders who are expected to contribute to the effective implementation of these security norms.

Our security organization ensures that the Security Management System is periodically reviewed for relevance and effectiveness. This Policy applies to Cinchis globally, including all subsidiaries, associates, and external parties with access to our infrastructure or information resources.

Violations or contraventions of this Policy will result in disciplinary action or termination of access, applicable to all personnel and external parties without exception.