=
✕
  • Solutions
  • Platform
  • Academy
  • Login
  • Request a Demo
Solutions To Listen BetterListenCustomer Experience
All-in-one CX Management
Employee Experience
Empower and retain the best employees
B2B Experience
Streamline the B2B customer journey from pre-sales to support
User Experience
Make irresistible products with omnichannel feedback, analytics and segmentation
Market Research & Insight
Transform insight into more customers that will stick around
Solutions To Resolve FasterResolveWeb Messenger
Connect with customers in real time, resolve issues efficiently and offer delightful experiences everywhere
Chatbot
Streamline buying experiences with welcome messages, popups and personalized prompts
Solutions To Sell MoreSellLead Generation
Bring your sales team closer to your future customers
Targeted Messages
Coming Soon
Send targeted messages to prospects to boost conversion rates across your channels
Marketing Intelligence
Coming Soon
Gain an unprecedented understanding of the customer experience
Sales Bot
Coming Soon
Drive more sales with an automated, always-on sales chatbot
Solutions
Solutions To Listen BetterCore PlatformAutomationTicket ManagementRouting & EscalationsReporting DashboardsSurveys & Interactive FlowsCRM Contact DatabaseAnalytics & Event Tracking
Solutions To Resolve FasterPowerupsEnterprise SuiteAdvanced ReportingAdvanced Survey Builder
Project Management
Coming Soon
Social Experience
Coming Soon
Knowledge Base
Coming Soon
Journey Automation
Coming Soon
Solutions To Sell More
Platform Integrations
Coming Soon
Solutions To Sell MoreTinyNPS: Pisano Community Edition
Platform

Security Policies

Senior Management Commitment

Pisano Senior Management undertakes to fulfill the requirements for the realization, operation, monitoring, review, maintenance and improvement of information security, and the fulfillment of applicable legal requirements and ISO / IEC 27001 standard.

Pisano adopts the following principles regarding information security management;

  • Pisano values ensuring the safety of its activities regarding the products and services it offers to its customers and stakeholders.
  • All business processes are aimed to be integrated, compatible and balanced with each other. Integrated and dynamic business strategy requires the security and continuity of information assets.
  • Pisano adopts as a principle to take precautions against risks that may threaten the confidentiality, integrity and accessibility of its products and services that provide value to its customers and stakeholders.
  • Intended outcomes of information security in line with this policy and the purpose of the organization are determined and continuous improvement opportunities are evaluated by measuring compliance at regular intervals.

Information Security Policy

Information security is possible by ensuring the confidentiality, integrity and accessibility of information assets.

  • The necessity of confidentiality, that the information is accessible only by authorized people,
  • Integrity requirement, ensuring the completeness and accuracy of information assets, protecting them from unauthorized changes,
  • Accessibility requirement implies that information assets are available to authorized users when needed.

Information assets are properly classified in Pisano. The assets are valued and the value of the assets is calculated to develop an appropriate level of control.

Pisano creates principles that regulate its own corporate functioning in order to ensure information security. Determining the Information Security Policy, defining security roles and making all relevant updates are carried out with the support of the Senior Management and the coordination of all business units. Pisano may seek the opinions of internal and external experts when necessary.

Information Security Objectives

Pisano aims to carry out information security studies for the following purposes without compromising the principles mentioned above;

  • Information Security Management System (ISMS) is planned, implemented and developed in line with the internationally accepted ISO / IEC 27001: Information Security Management System standard requirements,
  • Necessary studies are carried out to comply with the relevant laws and regulations,
  • Necessary actions for internal audit, management review, corrective actions and identifying risks and opportunities required for continuous improvement of ISMS are provided by the management and the teams that the management gives responsibility for information security,
  • All roles and responsibilities related to information security are determined and authorizations are made by the management,
  • The resources are provided by the management to carry out the necessary work within the framework of the information security management system,
  • Together with its stakeholders, material and moral losses that may adversely affect the competitive advantage of the organization are prevented,
  • The scope of Information Security Management System is decided by determining information assets, evaluating the information security expectations of related parties such as customers, suppliers and business partners, analyzing legal and contractual obligations, if any, and determined by the management in line with business strategies,
  • An asset inventory is created in order to classify information assets and evaluate the confidentiality, integrity and accessibility of these assets,
  • To manage information security risks, risk assessment, risk analysis and risk processing studies are carried out, necessary measures are developed and studies are carried out to prevent possible risks,
  • Information security objectives in line with this policy and the purpose of the organization are determined, compliance is measured at regular intervals and opportunities for continuous improvement are evaluated,
  • Confidentiality of personal information of employee is ensured,
  • Customer information is prevented from being accessed by unauthorized people,
  • Data integrity is ensured,
  • Information security is provided at the supplier,
  • Continuous development and protection of operational know-how is ensured,
  • End user awareness of information security and this awareness are continuously increased,
  • By managing information security effectively, possible damages arising from information security are minimized,
  • Necessary studies are carried out to reduce the possibility of experiencing an information security violation, and if it occurs, a coordinated response is provided,
  • Necessary arrangements are made to prevent interruptions in critical business processes, in case it cannot be exceeded, it is ensured that it can be operated again within the targeted recovery period,
  • Confidentiality, integrity and accessibility of our customers' information assets are ensured within the scope of the Information Security Management System. Continuity of critical business processes related to the customer is ensured,
  • Continuous improvement of the Information Security Management System is ensured,
  • In human resources management, processes where rules are determined in terms of ensuring security before, during and after employment are established,
  • It is ensured that necessary measures are taken to ensure security in internal working areas such as safe working areas, office areas, warehouses and around the institution,
  • In order to conduct supplier relations safely; procedures are established for reviewing the procurement services and managing the changes that occur. Security requirements are determined especially in agreements with information technology suppliers that express information security risks.

‍

Core Platform

  • Platform Overview
  • Automation
  • Ticket Management
  • Routing & Escalations
  • Reporting Dashboards
  • Surveys & Interactive Flows
  • CRM Contact Database
  • Analytics & Event Tracking

Solutions

  • Listen Better
  • Resolve Faster
  • Sell More

Powerups

  • Powerups Overview
  • Enterprise Suite
  • Advanced Reporting
  • Advanced Survey Builder

Pisano Academy

  • Academy Home
  • Articles
  • CX Glossary

Company

  • Careers at Pisano
  • Privacy Policy
  • Cookie Notice
  • Information Security Policy
  • Brand Guide & Assets

Social Media

  • Linkedin
  • Twitter
  • YouTube
  • Dribbble
  • Facebook
  • Instagram
© 2021 Pisano Limited • info@pisano.co 🌎
English Français Nederlands Русский Türkçe