U.S. Visa Ready
Resources from Mexico
Information Security Policy
Protecting Intellectual Property
(FSISP) Framework Science information security policy (ISP) is a set of rules, policies, and procedures designed to ensure all users and networks within our organization meet minimum IT security and data protection security requirements.
An organizational model for information security
Detect and preempt information security breaches caused by third-party vendors, misuse of networks, data, applications, computer systems, and mobile devices.
Protect Framework Science organization's reputation
Uphold ethical, legal, and regulatory requirements both in Mexico and the U.S.
Protect our client’s data and respond to inquiries and complaints about non-compliance of security requirements and data protection
Responsibilities and Duties of FS Employees
Acceptable use policies
FSISP Cyber Policy Introduction
Purpose: To mitigate risks apart from the Framework Science Security Policy and reinforce partners Security Policy
We have all Software Engineering staff work on Framework Science assigned computers so we can guarantee certainty that all work is being done with the security standards to protect our client’s intellectual property.
Framework Science Security Components
The Security Gateway combines reliable security features with high‑performance routing technology in a cost-effective unit.
Powerful Firewall Performance: The Security Gateway offers advanced firewall policies to protect your network and its data.
Convenient VLAN Support: The Security Gateway can create virtual network segments for security and network traffic management.
VPN Server for Secure Communications: A site-to-site VPN secures and encrypts private data communications traveling over the Internet.
QoS for Enterprise VoIP and Video: Top QoS priority is assigned to voice and video traffic for clear calls and lag‑free, video streaming. The Security Gateway is deployed in the same manner as Access Points for wireless networking. Use the intuitive Controller to conduct device detection, provisioning, and management.
Detailed Analytics: Use configurable reporting and analytics to monitor large user groups and expedite troubleshooting. Advanced search and sorting capabilities make network management more efficient.
Multi-Site Management: A single Controller running in the cloud can manage multiple sites: multiple, distributed deployments, and multi‑tenancy for managed service providers. Each site is logically separated and has its own configuration, maps, statistics, guest portal, and administrator read/write and read-only accounts.
LAN/WLAN Groups: The Controller can manage flexible configurations of large deployments. Create multiple LAN and WLAN groups and assign them to the respective devices.
We're Hiring!Upload your resume
U.S. Errors and Omissions Insurance Coverage
FS Legal Department U.S. and Mexico
Cities of Operation
San Francisco / Palo Alto
Hollywood / Los Angeles
Mexico City Engineering office
GOLDSMITH 40 COL. POLANCO, CIUDAD DE MÉXICO 11550
Tijuana HQ Engineering Center
Diego Rivera, Zona Rio
Tijuana, Baja California 22010
Ensenada Office - Caracol Museum of Science, Rotario no.3 Zona Federal, 22800 Ensenada, Baja California
All content on this site © 2019
All copyright, trademarks, design rights, patents and other intellectual property rights (registered and unregistered) in and on Framework Science Online Services and Framework Science Content belong to the Framework Science and/or third parties (which may include you or other users.) The Framework Science reserves all of its rights in Framework Science Content and Framework Science Online Services. Nothing in the Terms grants you a right or license to use any trademark, design right or copyright owned or controlled by the Framework Science or any other third party except as expressly provided in the Terms.
This privacy notice applies solely to information collected by this website. It will notify you of the following:
What personally identifiable information is collected from you through the website, how it is used and with whom it may be shared.
What choices are available to you regarding the use of your data.
The security procedures in place to protect the misuse of your information.
How you can correct any inaccuracies in the information.
Information Collection, Use, and Sharing
We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.
We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.
Your Access to and Control Over Information
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:
See what data we have about you, if any.
Change/correct any data we have about you.
Have us delete any data we have about you.
Express any concern you have about our use of your data.
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.
Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for "https" at the beginning of the address of the Web page.
While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.