Information Security Policy

  • Protecting Intellectual Property


    (FSISP) Framework Science information security policy (ISP) is a set of rules, policies, and procedures designed to ensure all users and networks within our organization meet minimum IT security and data protection security requirements.

    A small tagline
    • An organizational model for information security

    • Detect and preempt information security breaches caused by third-party vendors, misuse of networks, data, applications, computer systems, and mobile devices.

    • Protect Framework Science organization's reputation

    • Uphold ethical, legal, and regulatory requirements both in Mexico and the U.S.

    • Protect our client’s data and respond to inquiries and complaints about non-compliance of security requirements and data protection

    Responsibilities and Duties of FS Employees

    Operational Governance

    • Security programs

    • Acceptable use policies

    • Network security

    • Physical security

    • Business continuity

    • Access management

    • Security awareness

    • Risk assessments

    • Incident response

    • Data security

    • Disaster recovery

    • Incident management

    FSISP Cyber Policy Introduction

    Purpose: To mitigate risks apart from the Framework Science Security Policy and reinforce partners Security Policy

    We have all Software Engineering staff work on Framework Science assigned computers so we can guarantee certainty that all work is being done with the security standards to protect our client’s intellectual property.

    Framework Science Security Components

    • The Security Gateway combines reliable security features with high‑performance routing technology in a cost-effective unit.

    • Powerful Firewall Performance: The Security Gateway offers advanced firewall policies to protect your network and its data.

    • Convenient VLAN Support: The Security Gateway can create virtual network segments for security and network traffic management.

    • VPN Server for Secure Communications: A site-to-site VPN secures and encrypts private data communications traveling over the Internet.

    • QoS for Enterprise VoIP and Video: Top QoS priority is assigned to voice and video traffic for clear calls and lag‑free, video streaming. The Security Gateway is deployed in the same manner as Access Points for wireless networking. Use the intuitive Controller to conduct device detection, provisioning, and management.

    • Detailed Analytics: Use configurable reporting and analytics to monitor large user groups and expedite troubleshooting. Advanced search and sorting capabilities make network management more efficient.

    • Multi-Site Management: A single Controller running in the cloud can manage multiple sites: multiple, distributed deployments, and multi‑tenancy for managed service providers. Each site is logically separated and has its own configuration, maps, statistics, guest portal, and administrator read/write and read-only accounts.

    • LAN/WLAN Groups: The Controller can manage flexible configurations of large deployments. Create multiple LAN and WLAN groups and assign them to the respective devices.

All Posts
All copyright, trademarks, design rights, patents and other intellectual property rights (registered and unregistered) in and on Framework Science  Online Services and Framework Science  Content belong to the Framework Science and/or third parties (which may include you or other users.) The Framework Science  reserves all of its rights in Framework Science  Content and Framework Science  Online Services. Nothing in the Terms grants you a right or license to use any trademark, design right or copyright owned or controlled by the Framework Science or any other third party except as expressly provided in the Terms.
This privacy notice applies solely to information collected by this website. It will notify you of the following:

What personally identifiable information is collected from you through the website, how it is used and with whom it may be shared.
What choices are available to you regarding the use of your data.
The security procedures in place to protect the misuse of your information.
How you can correct any inaccuracies in the information.
Information Collection, Use, and Sharing 
We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.

We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.

Unless you ask us not to, we may contact you via email in the future to tell you about specials, new products or services, or changes to this privacy policy.

Your Access to and Control Over Information 
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:

See what data we have about you, if any.
Change/correct any data we have about you.
Have us delete any data we have about you.
Express any concern you have about our use of your data.
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.

Wherever we collect sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for "https" at the beginning of the address of the Web page.

While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.