Altamira MS Holdings | Trust Center
Evantic Trust Center
We are committed to ensuring the confidentiality, integrity, and availability of your data. Here is how we protect information and comply with industry standards and regulations.
Monitoring

Resources

Terms Of Service

Resource Center

Quality Management Systems

FAQs

Monitoring

Continuously monitored by Secureframe

Compliance

ISO 9001:2015

We establish, implement, integrate and maintain an automated ISO 9001:2015 compliant Quality Management System that ensures we are providing the highest quality products to our customer’s exact specifications.

SEMI F57 Compliant

Evantic offers high purity, copy-exact polymer material solutions at tight dimensional tolerances that are SEMI F57 compliant.

CMMC

CMMC Level 2 Self-Attest. CMMC is a U.S. Department of Defense framework verifying contractors have implemented required cybersecurity practices to protect sensitive government data.

AEROSPACE

Strict controls on our manufacturing process and material traceability ensure our products meet your tight tolerance requirements.

Monitoring

Organizational Management

Information Security Program Review
Management is responsible for the design, implementation, and management of the organization’s security policies and procedures. The policies and procedures are reviewed by management at least annually.

Vulnerability Management

Vulnerability and Patch Management Policy
A Vulnerability Management and Patch Management Policy outlines the processes to efficiently respond to identified vulnerabilities.

Incident Response

Lessons Learned
After any identified security incident has been resolved, management provides a "Lessons Learned" document to the team in order to continually improve security and operations.
Incident Response Plan
An Incident Response Plan outlines the process of identifying, prioritizing, communicating, assigning and tracking confirmed incidents through to resolution.

Access Security

Access Control and Termination Policy
An Access Control and Termination Policy governs authentication and access to applicable systems, data, and networks.
Unique Access IDs
Personnel are assigned unique IDs to access sensitive systems, networks, and information