ISO 9001 and ISO 27001
One Voice’s management system was certified to the two ISO standards 9001 and 27001 in August 2015. This certification is the result of our long-term work with our quality and management system CIM, and is based on a greater demand from the market for proven quality of our products and deliveries.
Why ISO certified?
Becoming certified is a guarantee that the certificate is internationally recognised. Periodic audits ensure that the entire management system is followed up and maintained.
Third-party, unbiased evaluations prevent organisations from getting stuck in ingrained routines, but to critically assesses them with the aim of improvement.
What does ISO certification mean to you?
For One Voice, our work to achieve ISO certification is part of our efforts to improve safety and security. Everything we do related to safety and security in our products and services will benefit our customers. We strive always to make you feel confident that all your information is safe with us. It is also our responsibility to have established procedures that in turn ensure that we meet our obligations to each and every customer. You can feel safe as a customer of One Voice!
Facts – ISO 9001
An ISO 9001 certificate indicates that the management system has been measured against and proven to be consistent with a standard for best practices within quality management. The certification is performed by an independent third party, and lets customers know they can trust that we have implemented the necessary internal procedures to meet our obligations.
Facts – ISO 27001
An ISO 27001 certificate indicates that the management system has been measured against and proven to be consistent with a standard for best practices within information security. This certification by an independent certification body shows that we have taken the necessary measures to protect sensitive information against unauthorised access and changes.
Cyber Essentials is a Government-backed, industry-supported scheme to help organisations protect themselves against the most common threats found on the internet. Most cyber attacks exploit basic weaknesses in software and IT systems: Cyber Essentials shows you how to fix those basics and get a good level of cyber security in place.