Information Security Policy

General objectives for the information security management system includes improving the Information Security practice and adoption, fostering this culture within the company and to reduce the likelihood and impact of security incidents.

This Policy and the entire ISMS must be compliant with legal and regulatory requirements relevant to the organization in the field of information security, as well as with contractual obligations.

Risk Management

Crossjoin implements a Risk Management Process adequate to identifying Risks, Opportunities and safeguarding critical assets.

Information Security Controls

Corrective and/or Preventive actions (Controls) will be selected in accordance with the Risk Management Process defined, in such a way that these actions are adequate to reduce the identified risks to acceptable levels.

ISO 27001

Information Security Awareness & Culture

The company is committed to improving the Information Security Culture, to achieve this objective Crossjoin has established regular Information Security Awareness Training to all its Personnel.

Moreover, Crossjoin is committed to the creation of an Information Security Culture, to ensure adequacy to existing information security requirements.

Information Security Policies

Existing Policies and Procedures are well documented and available to everyone within the Company. Regular reminders and training sessions to all Personnel are scheduled to ensure internal compliance.

Technical Competence

Crossjoin will ensure that personnel assigned to positions, allocated to projects or granted privileges to assets will have the appropriate knowledge, experience, training and/or close supervision from an experienced professional with adequate knowledge.

Continual Improvement

Crossjoin Solutions is fully committed to the Continual Improvement of the ISMS, under the ISO 27001 standard and Best Practices.

Support for ISMS implementation

Crossjoin declares that ISMS implementation and continual improvement will be supported with adequate resources in order to achieve all objectives set in the Information Security Policy, as well as satisfy all identified requirements.

Information Security Objectives

Adopt Information Security best practices and standards – such as ISO 27001 – in our daily operations to ensure adequate levels of protection to all internal and external Data.

Efficient management of the Information Security Management System (ISMS) considering Risk Management, the ISMS Performance, and Continual Improvement.

Ensure the security of Information, especially external, such as: Customer data; Customers’ Client Data; Supplier data; Personnel; and Partners insofar that the Confidentiality, Integrity, Availability and Privacy of information are adequately protected.

Information Security Management in operational activities with the collection of KPIs to ensure continual improvement.

Ensure legal and contractual compliance with the observation of legal requirements and management of responsibilities.

Our Certificate


Committed with the security of your project and your team






Have a Question?

If you have any questions for us regarding this policy please get in touch with us through the email.

Ready to start a project with us?

We have a team of professionals ready to respond to any challenge!

Talk to us!

Are you up to the challenge?

Know how to become a Kenshi of IT and participate in exciting projects!

Join us!