Quality and Data Protection
Quality Management System
Quality is fundamental for us and is reflected in all our activities, processes, and services. Our goal is to deliver “healthy data” that meets the highest quality standards, contributing to better diagnosis and treatment for patients.
Company Quality Strategy
Our company has implemented an integrated quality management system according to ČSN EN ISO 9001 (Quality Management System) and ČSN ISO/IEC 27001 (Information Security Management System), which we regularly maintain and enhance through annual certification audits.
We place significant emphasis on security in delivering IT services. Our internal processes and technical infrastructure meet the requirements of the current ISO/IEC 27001 standard, ensuring data confidentiality, availability, and integrity. We continuously educate our team in cybersecurity and strengthen our resilience against threats.
In addition to providing IT services, we manage projects in the medical device sector, adhering to standards ISO/IEC 13485 (Quality Management System for Medical Devices) and ISO/IEC 14155 (Clinical Investigation of Medical Devices for Human Subjects – Good Clinical Practice). Beyond these normative requirements, we also follow Good Clinical Practice (GCP) and Good Pharmacoepidemiological Practice (GPP) guidelines.
Quality Control
Our quality system is described in standard operating procedures, guidelines, plans, and records with clearly defined responsibilities and authority. It includes identifying, mapping, and documenting all processes within the organization, enabling their effective management and control.
Risk management is integral to our system, involving identification of problematic steps, risk assessment, and implementation of corrective and preventive measures to keep risks within acceptable levels.
We strive for continuous improvement and innovation, aiming for efficiency, high standards, and maximum customer satisfaction.
Penetration Testing
To verify and ensure a high level of security, we regularly subject our systems to penetration tests. Tests are conducted by an ethical hacker from Com Guard a.s., simulating real cyberattacks to uncover potential vulnerabilities. We consistently pass these penetration tests without identified weaknesses, demonstrating the robust security of our systems and services. Our applications, infrastructure, and human resources undergo regular security evaluations.