HLi Terms of Use HLi is a company committed to the protection and confidentiality of data. The purpose of this policy is to collect, process, store, and share data transparently. Here is a summary of what this privacy and data protection policy covers. 1. HLi Information security policies Information and its support systems are critical assets that HLi protects with the appropriate measures and controls. Information security policies are the embodiment of HLi 's commitment and vision in the field of information security. These policies specify requirements and best practices for information security. Information security policies ensure, in particular, the control of information risks and the continuity of its activities and operations. 1.1 Objectives The objectives of HLi information security policy are: - Protect the reputation, integrity, ethics, and public image of HLi. - Maintain the trust of customers, suppliers, guardianship, as well as the partners of HLi. - Protect the confidentiality of sensitive information. - Protect sensitive operational data from inappropriate disclosures. - Prevent third parties against illegal or malicious acts against HLi systems. - Ensure non-repudiation to ensure that an integration or update operation cannot be denied. - Check the authentication which consists of ensuring the identity of a user and guarantee each correspondent that his partner is who he thinks he is. Authentication is necessary for non-repudiation. - Ensure the traceability in order to keep an original, timestamped, explicit and integrated probative trace of a technical event, such as the technical traces of security or logs, or of a business act, such as the audit trail; to be probative, a trace must be able to be attached to an actor and a reference to reliable time. - Optimize the use of HLi resources by ensuring that they are not misused or wasted. - Prevent against fraud. - Prevent major incidents that can lead to business interruptions. - Comply with regulatory and legal requirements. - Support the business and business objectives of HLi. - Reduce the risks of breach of the confidentiality, integrity and availability of information, by defining the principles for the use and processing of information. 1.2 ISMS & QMS conformity We have appointed a data protection officer. This data protection officer oversees advising, informing and checking compliance with the data protection regulations. As part of its measures, HLi appointed an ISMS & QMS officer who is in charge of the conformity of data usage and security of all services and products. Our ISMS & QMS officer makes sure that the 7 principals of QMS are been respected: • Customer focus • Leadership • Engagement of people • Process approach • Improvement • Evidence based decision making • Relationship management Our ISMS & QMS officer, in addition, oversees supervising and implementing the necessary controls to protect the confidentiality, availability and integrity of information management. 1.3 Field of Application The information security policies of HLi apply in particular to: - Information in all its forms, resident on servers, PCs, network or other equipment, databases, personal documents, files and working documents. - All applications, operating systems, software packages and software. - Any hardware, server, workstation, laptop, network component, smart sensor, communication equipment and owned device. - All the sites of HLi that host the information and its support systems. - All permanent, contractual, and temporary employees, trainees, consultants, suppliers and third-party service providers or staff assigned to work with HLi. - It is COMPULSORY that all the members of HLi mentioned above adhere to these policies and all the standards and directives that are derived from them. 2. Normative references & good practices The guiding principles underlying these policies are drawn mainly from the good practices of the following international standards: * Quality management system ISO 9001:2015: Collection of business processes focused on consistently meeting customer requirements and enhancing their satisfaction. * International Standard ISO 27001: 2013: Security techniques - Information security management systems - Requirements. * International Standard ISO 27002: 2013: Security techniques - Code of good practice for the management of information security. * International Standard ISO 27005: 2011: Security techniques - Management of risks related to information security. * International Standard ISO / IEC 27000: Information technology - Security techniques - Information security management systems - Overview and vocabulary. * Center for Internet Security - https://www.cisecurity.org/ * National Agency for the Security of Information Systems - https://www.ssi.gouv.fr/ 3. Specific policies HLi 's specific information security policies include: 1. Charter of good use of IT resources, messaging, and the Internet. 2. IT Directors Charter of HLi. 3. Privacy Policy. 4. Access control policy for information systems. 5. Physical and environmental security policy. 6. Log management policy (log). 7. Computer remote maintenance policy. 8. Functional backup and restore policy. 9. Security Patch Management Policy. 10. Change Management Policy. 11. Malware management policy. 12. Supplier and Subcontractor Management Policy. 13. Communications security policy. 14. Policy for the acquisition, development, and maintenance of computer applications. 15. Cryptography policy. 16. Information Security Incident Management Policy. 17. Change Management Policy for Computer Applications. 18. Internal, external and security compliance policy for information system security. 19. Policy Test. 20. Policy of Continuity of the Security of the Information. The buyer should commit to Microsoft Appsource policies as well as Microsoft License policies used with this product. 4. Terms of License Our product is available for free as it is. Additional fees maybe applied if a customization is required. You need to have a Power BI Pro License to get our product. 5. Agreement During the various contacts that we have with you, you may be asked to communicate information that concerns you. This information is collected in particular when you request a contact, download documentary or commercial resources, or when you apply online for one of our offers, and will be kept confidential and won’t be used without your explicit consent. This data includes your name and contact details, your e-mail address, and any other information you wish to bring to our attention, regarding you, your company details: - When using the contact form: Identity and contact information. - When downloading electronic documents on our site (brochures, documentation, or white papers for example): Identity and contact information. - When registering for HLi Group events: Identity and contact information. Copyright Notice: This product and its content are copyright of HLi Consulting Tunisia - HLi Consulting Tunisia All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. For permission requests, please visit https://www.groupe-hli.com/contact/ 6. Warranty Disclaimer: The result that will be displayed depends on your type of data and its structure. Certain customizations to the Sales Module require respective customization to our product to be specific to the context. There is no risk of data loss since you connect you CRM data only to be consumed without any impact on the content. 7. Limitation of liability If you have any issues or inquiries with the free version of the product, no support will be available. However, clients with the support option can inquire a recovery up to an amount equal to your Services fee for the month during which the loss or breach occurred. 8. Payment The default standard version of our product is free of charge. No fees are applied to the product when used as it is. Payment is required for clients requiring context specific customizations, the necessary fees depend on the required level of customization. 9. Pre-requisite The use of this product requires a Power BI Pro license. 10. Purchase Please use the contact us link or directly visit https://www.groupe-hli.com/contact/ for commercial purposes. An account manager will contact you for qualification of your requirement and advise. <>