The ISO 27001 standard ensures the robustness of Propack's information security system. This is critical for any business that handles customer data or information.
Our Information Management System consists of many different parts and pieces and covers any processes, documents and technology that handle data, as well as people.
The ISO standard, and associated assessments, ensure that we follow the strictest levels of security practice and have passed regular independent, expert and professional assessment that tests whether data is properly protected or not.
As such Propack has to undergo regular risk assessments, meaning that we are always up-to-date with the latest in best practice, safe guidance and robust data management systems.
ISO 14001 is an internationally accepted standard that sets out processes and procedures to establish and maintain an effective Environmental Management System (EMS). The standard is designed to address the delicate balance between maintaining profitability and reducing environmental impact.
The ISO 14001 environmental management standards exist to help organisations minimize how their operations negatively affect the environment, comply with applicable laws, regulations and other environmentally oriented requirements and continually improve in the above. The environmental policy we have in place is available on request.
The Forest Stewardship Council® (FSC) certification assures our customers that our business operates in an environmentally, economically and socially responsible way.
FSC certification enables us to guarantee that FSC-labelled items we produce for our customers, have come from a forest and supply chain that is managed responsibly from forest to end use.
Cyber Essentials is a cyber security standard that uses independent third party assessment parties to identify the IT security controls that an organisation needs to have in place to have confidence that they are addressing cyber security effectively and mitigating the risk from internet-borne threats.
An organisation’s technology that is exposed to common cyber-attacks will typically include internet connected computers, such as desktop PCs, laptops, tablets and smartphones, along with internet connected servers such as email, web and application servers.