Altamira MS Holdings | Trust Center
Evantic Trust Center
We are committed to ensuring the confidentiality, integrity, and availability of your data. Here is how we protect information and comply with industry standards and regulations.
Monitoring

Resources

Terms Of Service

Website Privacy Policy

Resource Center

Quality Management Systems

ROHS & Reach Compliance

FAQs

Dimensional Inspections Color Measurement Tensile Properties (ASTM D638/D882) Specific Gravity (ASTM D792) Compressive Properties (ASTM D695) Deformation Under Load (ASTM D621) Composition and Thermal Degradation – TGA (ASTM D3850) Transition Temperatures and Enthalpy of Fusion – DSC (ASTM D3418/D4591) Dielectric Strength/Breakdown (ASTM D149) Shore Hardness (ASTM 2240) Volume and Surface Resistivity (ASTM D257)

Monitoring

Continuously monitored by Secureframe

Compliance

ISO 9001:2015

We establish, implement, integrate and maintain an automated ISO 9001:2015 compliant Quality Management System that ensures we are providing the highest quality products to our customer's exact specifications.

SEMI F57 Compliant

Evantic offers high purity, copy-exact polymer material solutions at tight dimensional tolerances that are SEMI F57 compliant.

CMMC

CMMC Level 2 Self-Attest. CMMC is a U.S. Department of Defense framework verifying contractors have implemented required cybersecurity practices to protect sensitive government data.

AEROSPACE

Strict controls on our manufacturing process and material traceability ensure our products meet your tight tolerance requirements.

Monitoring

Change Management

Secure Development Policy
A Secure Development Policy defines the requirements for secure software and system development and maintenance.

Organizational Management

Information Security Policy
An Information Security Policy establishes the security requirements for maintaining the security, confidentiality, integrity, and availability of applications, systems, infrastructure, and data.
Information Security Program Review
Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually.
Internal Control Policy
An Internal Control Policy identifies how a system of controls should be maintained to safeguard assets, promote operational efficiency, and encourage adherence to prescribed managerial policies.
Background Checks
Background checks or their equivalent are performed before or promptly after a new hires start date, as permitted by local laws.
Security Awareness Training
Internal personnel complete annual training programs for information security to help them understand their obligations and responsibilities related to security.

Confidentiality

Data Classification Policy
A Data Classification Policy details the security and handling protocols for sensitive data.
Data Retention and Disposal Policy
A Data Retention and Disposal Policy specifies how customer data is to be retained and disposed of based on compliance requirements and contractual obligations.

Vulnerability Management

Vulnerability Scanning
Vulnerability scanning is performed on production infrastructure systems, and identified deficiencies are remediated on a timely basis.
Vulnerability and Patch Management Policy
A Vulnerability Management and Patch Management Policy outlines the processes to efficiently respond to identified vulnerabilities.

Incident Response

Lessons Learned
After any identified security incident has been resolved, management provides a "Lessons Learned" document to the team in order to continually improve security and operations.
Incident Response Plan
An Incident Response Plan outlines the process of identifying, prioritizing, communicating, assigning and tracking confirmed incidents through to resolution.

Risk Assessment

Risk Assessment and Treatment Policy
A Risk Assessment and Treatment Policy governs the process for conducting risk assessments to account for threats, vulnerabilities, likelihood, and impact with respect to assets, team members, customers, vendors, suppliers, and partners. Risk tolerance and strategies are also defined in the policy.
Risk Register
A risk register is maintained, which records the risk mitigation strategies for identified risks, and the development or modification of controls consistent with the risk mitigation strategy.

Network Security

Network Security Policy
A Network Security Policy identifies the requirements for protecting information and systems within and across networks.

Access Security

Access Control and Termination Policy
An Access Control and Termination Policy governs authentication and access to applicable systems, data, and networks.
Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and information
User Access Reviews
System owners conduct scheduled user access reviews of production servers, databases, and applications to validate internal user access is commensurate with job responsibilities.

Physical Security

Physical Security Policy
A Physical Security Policy that details physical security requirements for the company facilities is in place.