Acsour has confirmed that it complies with the Information Security Management System ISO/IEC 27001:2013
News \ 31.01.2018

By obtaining this certificate, Acsour, the international outsourcer of internal business processes, proves that it ensures a high level of confidentiality for its clients and partners.

It took less than a year for the company to implement the information security management system. This challenging and important project was launched at the beginning of 2017, and as early as in December we held an audit of the information security management system at all offices and in the data center of Acsour. The audit that was performed by the experts of the international certification company Afnor and, based on the results, we were awarded the prestigious and internationally acclaimed certificate ISO/IEC 27001:2013.

“We were able to meet such a tight deadline because one of the principles our company adheres to is that we ensure the strict confidentiality and integrity of our clients’ data,” comments the company’s COO Dmitry Karev. “Therefore, by the time we started to prepare for the audit, all of the policies and procedures that Acsour had been applying for a long time already ‘covered’ a significant part of the requirements of ISO 27001 standard.”

The ISO/IEC 27001:2013 certificate will open up new business opportunities for Acsour and will enhance its competitiveness on the market. This is an important step towards the implementation of the company’s long-term strategic goals.

Acsour respects clients’ careful attitude on their information security. We are trying to improve own business processes constantly to meet our partner’s expectations.


Information about ISO/IEC 27001:

ISO/IEC 27001 is an international standard containing requirements in the area of information security based on the best global practices for the creation, development and maintenance of an information security management system within a company. The standard specifies the methods a company’s senior management may use to work effectively with persons responsible for information security and for management to be involved in information security management processes.