{"id":15875,"date":"2025-07-18T05:47:44","date_gmt":"2025-07-18T05:47:44","guid":{"rendered":"https:\/\/pecb.com\/?page_id=15875"},"modified":"2025-11-20T09:35:10","modified_gmt":"2025-11-20T08:35:10","slug":"pecb-quality-and-information-security-policies","status":"publish","type":"page","link":"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies","title":{"rendered":"Quality and Information Security Policies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15875\" class=\"elementor elementor-15875\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c805e1a e-flex e-con-boxed e-con e-parent\" data-id=\"3c805e1a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1363f37b elementor-widget elementor-widget-heading\" data-id=\"1363f37b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Quality and Information Security Policies<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aff0275 e-flex e-con-boxed e-con e-parent\" data-id=\"aff0275\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9230aef elementor-widget elementor-widget-text-editor\" data-id=\"9230aef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\">\n        <style>\n            .child-pages {\n                display: flex;\n                flex-wrap: wrap;\n                justify-content: center;\n                gap: 8px;\n                width: fit-content;\n                margin: 0 auto;\n                 padding:10px;\n            }\n            .child-pages li {\n                display: flex;\n                padding: 8px 16px;\n                flex-direction: column;\n                align-items: center;\n                border-radius: 4px;\n                background: #FFF;\n                list-style: none;\n            }\n            .child-pages li.active {\n                background: #CBD5E1;\n            }\n            .child-pages li a {\n                color: #000;\n                text-align: center;\n                font-family: Parabolica, sans-serif;\n                font-size: 14px;\n                font-style: normal;\n                font-weight: 400;\n                line-height: normal;\n                text-decoration: none;\n            }\n            .child-pages li a:hover {\n                text-decoration: underline;\n            }\n        <\/style>\n    <ul class=\"child-pages\"><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\">About<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/accreditations-and-affiliations\">Accreditations and Affiliations<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/behavior-policy\">Behavior Policy<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/certification-mark-use-policy\">Certification Mark Use Policy<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/pecb-certification-process\">Certification Process<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/code-of-ethics\">Code of Ethics<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/complaint-and-appeal-policy\">Complaint and Appeal Policy<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/digital-trust\">Digital Trust: Building a Secure Future<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/gdpr-privacy-statement\">GDPR Privacy Statement<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/pecb-code-of-ethics-violation-policy\">PECB Code Of Ethics Violation Policy<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/team\">PECB Leadership<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/pecb-policy-regarding-canadian-and-international-economic-sanctions-and-the-countries-impacted\">PECB Policy Regarding Canadian and International Economic Sanctions and the Countries Impacted<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies\">Quality and Information Security Policies<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/pecb-refund-policy\">Refund Policy<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/statement-of-impartiality\">Statement of Impartiality<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/values-of-pecb-certification\">The Value of PECB Certification<\/a><\/li><li class=\"\"><a href=\"https:\/\/staging.pecb.com\/en\/about\/violation-of-pecb-brand-and-fraud-reporting-policy\">Violation of PECB Brand and Fraud Reporting Policy<\/a><\/li><\/ul><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46c1d9dd e-flex e-con-boxed e-con e-parent\" data-id=\"46c1d9dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-440d07a1 elementor-widget elementor-widget-text-editor\" data-id=\"440d07a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Quality Policy<\/strong><\/h2><h3>It is the policy of our organization to:<\/h3><ol><li>Define and meet our customer&#8217;s requirements.<\/li><li>Ensure that our Policies and Procedures are clear and concise to reflect what we actually do.<\/li><li>Monitor and analyze performance metrics, making any necessary changes or adjustments to customer programs, customer satisfaction, the Quality Management System, and\/or any related entities as appropriate.<\/li><li>Educate all employees about the linkages between their jobs and Customer satisfaction.<\/li><li>Ensure effective Customer and internal communication.<\/li><li>Foster a team approach to problem solving and preventive action by empowering all employees to be quality ambassadors.<\/li><li>Integrate organization\u2019s Quality Management system into the Company&#8217;s culture and daily practices, establishing a long-term commitment to quality, continuous improvement, and customer satisfaction.<\/li><li>Meet and\/or exceed our customer&#8217;s expectations through continuous improvement.<\/li><li>Guarantee that organization\u2019s top management meets regularly with the Quality Management representative to review and ensure the effectiveness of the Quality Management System.<\/li><\/ol><h2><strong>Information Security Policy<\/strong><\/h2><h3>Policy Summary\u00a0<\/h3><ul><li>Information should always be protected, regardless of how it is formed, shared, communicated, or stored.<\/li><\/ul><h3>Introduction\u00a0<\/h3><ul><li>Information can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by post or by using electronic means, shown on films, or spoken in conversation.\u00a0<\/li><li>Information security is the protection of information from a wide range of threats in order to ensure business continuity, minimize business risk, and maximize return on investments and business opportunities.\u00a0<\/li><\/ul><h3>Scope\u00a0<\/h3><ul style=\"margin-left: 40px;\"><li><span style=\"background-color: transparent;\">This policy applies to all departments in the organization.<\/span><\/li><\/ul><h3>Information Security Objectives\u00a0<\/h3><ul><li><span style=\"background-color: transparent;\">Strategic and operational information security risks are understood and treated as acceptable to the organization.\u00a0<\/span><\/li><li><span style=\"background-color: transparent;\">The confidentiality, integrity, and availability of customer information, product development and all confidential information are assured.\u00a0\u00a0<\/span><\/li><\/ul><h3>Information Security Principles\u00a0<\/h3><ul><li><span style=\"background-color: transparent;\">This organization encourages risk-taking and tolerates risks provided that information risks are understood, monitored, and treated when necessary.\u00a0<\/span><\/li><li><span style=\"background-color: transparent;\">All employees will be made aware and accountable for information security as relevant to their role.<\/span><\/li><li><span style=\"background-color: transparent;\">Provisions will be made for funding information security controls in operational and project management processes.\u00a0<\/span><\/li><li><span style=\"background-color: transparent;\">Information security risks will be monitored and action taken when changes result in unacceptable risks.\u00a0<\/span><\/li><li><span style=\"background-color: transparent;\">Situations \u00a0that \u00a0could \u00a0place \u00a0the \u00a0organization \u00a0in \u00a0breach \u00a0of \u00a0laws \u00a0and \u00a0statutory \u00a0regulations \u00a0will \u00a0not \u00a0be \u00a0tolerated.<\/span><\/li><\/ul><h3>Responsibilities\u00a0<\/h3><ul><li><span style=\"background-color: transparent;\">Management is responsible for ensuring that information security is adequately addressed throughout the organization. Management shall also review this policy annually, or as needed when significant changes occur in the organization, and document this review.<\/span><\/li><li><span style=\"background-color: transparent;\">Each manager is responsible for ensuring that the people who work under their control protect information in accordance with the organization&#8217;s requirements.\u00a0<\/span><\/li><li><span style=\"background-color: transparent;\">Every staff member has information security responsibilities as part of doing their job.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Quality and Information Security Policies Quality Policy It is the policy of our organization to: Define and meet our customer&#8217;s requirements. Ensure that our Policies and Procedures are clear and concise to reflect what we actually do. Monitor and analyze performance metrics, making any necessary changes or adjustments to customer programs, customer satisfaction, the Quality [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":13144,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-15875","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quality and Information Security Policies - PECB<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quality and Information Security Policies - PECB\" \/>\n<meta property=\"og:description\" content=\"Quality and Information Security Policies Quality Policy It is the policy of our organization to: Define and meet our customer&#8217;s requirements. Ensure that our Policies and Procedures are clear and concise to reflect what we actually do. Monitor and analyze performance metrics, making any necessary changes or adjustments to customer programs, customer satisfaction, the Quality [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies\" \/>\n<meta property=\"og:site_name\" content=\"PECB\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PECBInternational\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-20T08:35:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@PECB\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies\",\"url\":\"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies\",\"name\":\"Quality and Information Security Policies - PECB\",\"isPartOf\":{\"@id\":\"https:\/\/staging.pecb.com\/en\/#website\"},\"datePublished\":\"2025-07-18T05:47:44+00:00\",\"dateModified\":\"2025-11-20T08:35:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging.pecb.com\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About\",\"item\":\"https:\/\/staging.pecb.com\/en\/about\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quality and Information Security Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.pecb.com\/en\/#website\",\"url\":\"https:\/\/staging.pecb.com\/en\/\",\"name\":\"PECB\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/staging.pecb.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.pecb.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.pecb.com\/en\/#organization\",\"name\":\"PECB\",\"url\":\"https:\/\/staging.pecb.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.pecb.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.pecb.com\/wp-content\/uploads\/2025\/05\/Clip-path-group.svg\",\"contentUrl\":\"https:\/\/staging.pecb.com\/wp-content\/uploads\/2025\/05\/Clip-path-group.svg\",\"width\":96,\"height\":26,\"caption\":\"PECB\"},\"image\":{\"@id\":\"https:\/\/staging.pecb.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PECBInternational\/\",\"https:\/\/x.com\/PECB\",\"https:\/\/www.linkedin.com\/company\/pecb\",\"https:\/\/www.youtube.com\/channel\/UCQPfrnIUa7Q0oBRyT8l5eTg\",\"https:\/\/www.instagram.com\/pecb.official\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quality and Information Security Policies - PECB","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies","og_locale":"en_US","og_type":"article","og_title":"Quality and Information Security Policies - PECB","og_description":"Quality and Information Security Policies Quality Policy It is the policy of our organization to: Define and meet our customer&#8217;s requirements. Ensure that our Policies and Procedures are clear and concise to reflect what we actually do. Monitor and analyze performance metrics, making any necessary changes or adjustments to customer programs, customer satisfaction, the Quality [&hellip;]","og_url":"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies","og_site_name":"PECB","article_publisher":"https:\/\/www.facebook.com\/PECBInternational\/","article_modified_time":"2025-11-20T08:35:10+00:00","twitter_card":"summary_large_image","twitter_site":"@PECB","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies","url":"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies","name":"Quality and Information Security Policies - PECB","isPartOf":{"@id":"https:\/\/staging.pecb.com\/en\/#website"},"datePublished":"2025-07-18T05:47:44+00:00","dateModified":"2025-11-20T08:35:10+00:00","breadcrumb":{"@id":"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/staging.pecb.com\/en\/about\/pecb-quality-and-information-security-policies#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.pecb.com\/en"},{"@type":"ListItem","position":2,"name":"About","item":"https:\/\/staging.pecb.com\/en\/about"},{"@type":"ListItem","position":3,"name":"Quality and Information Security Policies"}]},{"@type":"WebSite","@id":"https:\/\/staging.pecb.com\/en\/#website","url":"https:\/\/staging.pecb.com\/en\/","name":"PECB","description":"","publisher":{"@id":"https:\/\/staging.pecb.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.pecb.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/staging.pecb.com\/en\/#organization","name":"PECB","url":"https:\/\/staging.pecb.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.pecb.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/staging.pecb.com\/wp-content\/uploads\/2025\/05\/Clip-path-group.svg","contentUrl":"https:\/\/staging.pecb.com\/wp-content\/uploads\/2025\/05\/Clip-path-group.svg","width":96,"height":26,"caption":"PECB"},"image":{"@id":"https:\/\/staging.pecb.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PECBInternational\/","https:\/\/x.com\/PECB","https:\/\/www.linkedin.com\/company\/pecb","https:\/\/www.youtube.com\/channel\/UCQPfrnIUa7Q0oBRyT8l5eTg","https:\/\/www.instagram.com\/pecb.official\/"]}]}},"_links":{"self":[{"href":"https:\/\/staging.pecb.com\/en\/wp-json\/wp\/v2\/pages\/15875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.pecb.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.pecb.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.pecb.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.pecb.com\/en\/wp-json\/wp\/v2\/comments?post=15875"}],"version-history":[{"count":0,"href":"https:\/\/staging.pecb.com\/en\/wp-json\/wp\/v2\/pages\/15875\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/staging.pecb.com\/en\/wp-json\/wp\/v2\/pages\/13144"}],"wp:attachment":[{"href":"https:\/\/staging.pecb.com\/en\/wp-json\/wp\/v2\/media?parent=15875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}