Bühne Kugelmodell


We wish to protect the confidentiality, integrity, and availability of information under the application of Risk Management. 

For this reason, we commit ourselves:

  1. To meet applicable requirements such as applicable laws and regulatory stipulations towards the stakeholders;

  2. To ensure the availability of necessary resources;

  3. To define, control, monitor, and maintain permanently the information security throughout our enterprises; 

  4. To continually improve ISMS;

  5. To repeatedly assess information security risks;

  6. To identify, analyze and evaluate information security risks;

  7. To adapt to current needs;

  8. To prepare for disturbances, outages, and security incidents.

We are certified according to...