• slider-image

Main functionalities

admin

Polynomial Formulas
Contractor Analysis

The tool allows, based on configurable polynomial formulas, to qualify the contracting companies according to the levels of compliance, risk and criticality.

tablet

Reports and Statistics

There is a multiplicity of reports and statistics (PDF, Excel, Word, etc.) that allow to perform exhaustive anaylises during the control process.

plane

Historical records

The historical records related to the compliance status of the contractors and their resources are available for your reference at all times.

flag

Maturity Schedule

It is a tool that allows you to clearly display, view and organize the due status of each document.

flag

Digital Document Library.

The platform stores, for periods and in a systematic way, each of the documents subject to control, being available for your inquiry or download 24 x 7

flag

Notification and Programmable Alerts

The platform has a set of alerts and notifications, which will be configured based on user's preference.

TURN CERTRONIC INTO A UNIQUE TOOL, 100% ADAPTABLE TO YOUR NEEDS.

Multiple User Profiles

Certronic has different access platforms according to the user's profile.

Advantages to using Certronic

of information in a single place.

for the analysis of contractors.

to the control and analysis are available online 24x7.

image

Provides its contractors

with a document management tool.

of expirations and programmable events.

it allows custom development by our systems division.

Security

Security

We understand the information security as a discipline that relates to different techniques, applications and devices responsible for ensuring the integrity and privacy of the information of a computer system and its users. That is why our policy is strict and meets the current demands of the market so as to guarantee security and confidentiality in the operations.

Data Encryption

All data and information of the companies and users of the system are protected by AES-256 encryption. The use of secure servers, independent database management, periodic security audits, and monitoring of computer security equipment 24 hours a day, 365 days a year, are some of the actions we carry out within the framework of our security policy.

Data Protection Habeas Data

The holder of the personal data has the right to exercise their right of access to them at no charge at intervals of not less than six months, unless a legitimate interest for the purpose is established as established in article 14, paragraph 3 of the Law No. 25,326. The National Directorate for the Protection of Personal Data, Control Body of Law No. 25.326, has the authority to deal with complaints and claims that arise in relation to non-compliance with the rules on protection of personal data. All the data processed by the Certronic system are duly protected and guaranteed by the national laws and agreements in the matter.