Policies

Guidelines, Terms, and Conditions

1. Safety First

  • All work in mines or industrial environments must comply with national and international safety standards.
  • Employees are required to wear appropriate PPE and follow strict safety procedures during installations and maintenance.

2. Data Security & Privacy

  • All client data, video surveillance footage, and network credentials are confidential.
  • Secure servers and encrypted communication protocols are mandatory in all digital systems.

3. System Reliability & Uptime

  • Services such as ACS MVF, server maintenance, and Wi-Fi networks must guarantee high uptime (e.g., 99.9%) and include backup systems.

4. Client-Centered Service Desk

  • Service desk requests must be responded to within predefined SLAs (e.g., response in 2 hours, resolution within 24 hours).
  • All support interactions must be documented in the internal ticketing system.

5. Preventive Maintenance

  • Servers, ventilation systems, and surveillance networks are subject to scheduled maintenance.
  • Detailed reports must be delivered after each maintenance operation.

6. Installation Standards

  • All system installations (Wi-Fi, CCTV, ACS MVF) must follow engineering schematics and be inspected upon completion.
  • Every installation should be validated through a checklist and signed off by both the client and technical lead.

7. Technological Updates

  • Smart-Engineering systems must be regularly updated to ensure optimal performance, security, and compliance.
  • All firmware/software updates should be tested in a sandbox before deployment in live environments.

8. Employee Training & Certification

  • Technicians and engineers must undergo ongoing training to stay up to date with the latest technologies in automation, networking, and surveillance.

9. Environmental Responsibility

  • Minimize environmental impact during installations by using energy-efficient systems and responsible waste disposal.

10. Client Communication

  • Project updates must be delivered at each major milestone.
  • A final system walkthrough and training are required before project closure.

11. Access Control

  • Only authorized personnel may access restricted systems or areas, whether physical or digital.
  • Logs must be maintained for all access events.