In these Guidelines we want to make clear what are the rules governing our community in the interest of your company and of the network and what types of content are acceptable on SupplHi.
SupplHi is a company that aims to connect the companies belonging to the industrial world to allow them to have a clear panorama of the opportunities offered by the market and to be more successful. Our service is ideated to promote business opportunities for our users by enabling thousands of companies like your one to meet, create trust among each other, exchange ideas, learn, improve services and find business and transaction opportunities based on well informed decisions in a network of trusted relationships.
Thousands of data, information and shared insights are being exchanged every day on SupplHi. To ensure these information are useful to our community and help our Members be more productive, SupplHi has put in place the community Guidelines outlining the types of discussions and content that are acceptable on SupplHi, and what may be deemed inappropriate and stopped by SupplHi. These community Guidelines are intended to provide our Members guidance and complement the Terms and Conditions governing your use of SupplHi’s online service.
Our Members need to be real companies and people, who provide their real names, denomination and company information. It is not okay to provide misleading information about your company or yourself, your qualifications or affiliations to your company or achievements on SupplHi’s website.
Compliance with the Law and Fraud Prevention
We do not want SupplHi to be used for illegal activities or to violate the rights of others. Don’t use SupplHi’s services to commit fraud. Before sharing or using someone else’s copyrighted works, trademarks, information, data or trade secrets, please make sure you have the legal right to do so.
We ask you to behave professionally by not being inappropriate or dishonest. It is not okay to share untruthful data or information or pornography on SupplHi’s service.
SupplHi shouldn’t be used to create obstacles to other companies. It is not okay to use SupplHi’s services to harass, abuse, or send other unwelcomed communications to companies and people (e.g., junk mail, spam, chain letters).
Please, don’t use SupplHi’s services to intentionally infect others with viruses, worms, or other software that can destroy or interrupt their data or computer devices. It is not okay to interfere or disrupt SupplHi’s service.
Please don’t violate the rights of SupplHi. On this point, please, read carefully our Terms and Conditions. We recommend you do not to suggest that you are affiliated with or endorsed by SupplHi if you are not. It is not okay to violate SupplHi’s intellectual property rights.
The Information Security Management System has as its primary objective the protection of SupplHi's information assets and the maintenance of the requirements of confidentiality, integrity and availability of information.
Achieving adequate levels of security, allows the company to mitigate and counteract losses and damages that may impact on people, corporate image and reputation, economic and financial aspects, in as well as to ensure compliance with the contractual and legislative framework in force regarding the protection of information.
In this context, the Company identifies the following objectives for this policy:
- Adopt and implement generally recognized principles and best practices to ensure the Security of Information and promote the achievement of certifications of compliance with reference standards;
- Identify roles and responsibilities, to be assigned to its staff, regardless of the hierarchical level occupied, involving also third parties who perform key tasks;
- Assign the resources that are necessary to ensure the adoption of appropriate measures for physical, logical and organizational security aspects;
- Identify, document and apply rules governing the use of information, assets and tools;
- Develop an awareness programme for staff, through regular informative and training sessions;
- Provide adequate response and management measures in the event of incidents that may compromise information security and routine operations;
- Commit to carrying out a continuous process of improvement and evolution of the Information Security Management System, planning, executing, verifying and continuously implementing measures and precautions to counter potential events that could compromise the company's information assets.
The main steps to manage information security according to the standard can be effectively summarized through the PDCA (Plan, Do, Check, Act) cyclical paradigm.