The tool allows, based on configurable polynomial formulas, to qualify the contracting companies according to the levels of compliance, risk and criticality.
There is a multiplicity of reports and statistics (PDF, Excel, Word, etc.) that allow to perform exhaustive anaylises during the control process.
The historical records related to the compliance status of the contractors and their resources are available for your reference at all times.
It is a tool that allows you to clearly display, view and organize the due status of each document.
The platform stores, for periods and in a systematic way, each of the documents subject to control, being available for your inquiry or download 24 x 7
The platform has a set of alerts and notifications, which will be configured based on user's preference.
of information in a single place.
for the analysis of contractors.
to the control and analysis are available online 24x7.
with a document management tool.
of expirations and programmable events.
it allows custom development by our systems division.
We understand the information security as a discipline that relates to different techniques, applications and devices responsible for ensuring the integrity and privacy of the information of a computer system and its users. That is why our policy is strict and meets the current demands of the market so as to guarantee security and confidentiality in the operations.
All data and information of the companies and users of the system are protected by AES-256 encryption. The use of secure servers, independent database management, periodic security audits, and monitoring of computer security equipment 24 hours a day, 365 days a year, are some of the actions we carry out within the framework of our security policy.