After a thorough review of months and an intensive internal and external audit, we can that our information security structurally and demonstrably complies with internationally recognized requirements. Not a quick check, but a thorough assessment of processes, behavior, and responsibility.
