Policy

This page communicates the overall policy of Ledningssystemet Sverige AB (referred to as the Business below) and is the sole policy of the Business.

Evaluating and improving our working methods and complying with applicable legislation, agreements entered into and other binding requirements is a matter of course. The policy is intended to clarify how we work and our values towards customers, partners and representatives of the Business.

1. Business concept

The business concept is to provide the market with relevant and cost-effective tool support that assists public and private organizations in the systematic management work and increases the possibilities for standard compliance based on a number of international standards and frameworks. This is done through the service ledningssystemet.se .

Through the commitment that the tool support should be both relevant and cost-effective, the representatives of the Business are obliged not to shy away from recommending to customers and partners alternative tools and solutions that are deemed more suitable for their needs; our understanding is that ledningssystemet.se is not the answer to everyone’s questions and needs.

To ensure that the tool support continues to be relevant and cost-effective, the Business is working on feature growth and active management. The Operations representative works actively to obtain and understand customers’ experiences and wishes, primarily via customers’ partners, in order to identify what may constitute potential for improvement and not least what is outright functionality.

As a representative of Operations, it should be fun to go to work. Not everything is fun all the time but we should not work on assignments that lower our morale in the long term, and this includes the management of the management system.se . In the event that Operations does not intend to continue the management of the management system.se in the long term, our ambition is to firstly transfer the management to another actor and secondly release the code base as open source.

2. Conduct

As a representative of the Business, you are humble about the fact that the world is changing and that other people and companies may have better ideas, products and services than you. This could be the customer, our competitor colleagues or others. As part of this, we do not exclude fellow competitors and we encourage our customers and partners to use the management system.se as effectively and efficiently as possible. This may include, for example, a group of companies using only one customer instance even though the instance is used by several legal entities.

As a representative of the Business, you are happy to recommend one of the Business’s good competitors to customers and prospective customers when you believe that the competitor can provide a better or cheaper solution for the customer. If you are not comfortable recommending a competitor simply because it is a competitor, you should examine yourself and your competence and work on your shortcomings and become the expert you are expected to be.

Business representatives should not pretend and differentiate between different people. If you are a pig, be equally piggy to all people. If you are friendly and soft, be so to all persons. The business has intelligent customers who see through deception and expect honest and straightforward communication. When the customer asks for our opinion, we deliver it, whether it’s the CEO of a large company or someone else asking for it.

As a representative of the Business, you dress and behave in a way that makes you feel safe. We should never come across as people with exclusive and expensive lifestyles. This means not wearing expensive branded clothes and accessories. A good benchmark is that we never at any time display accessories and clothing worth more than 20% of a price base amount. We also do not drive around in expensive cars (the benchmark is that cars should not have a taxable benefit value above 8.5 price base amounts) in our assignments.

3. Pricing

The business must be a profit-making company in order to develop well over time. We do not care about “market prices” because we sell our time and expertise through the management system.se . Instead, we calculate every six months what license cost should apply to the service based on our own costs with a mark-up for profit. We must always have a margin to be able to carry out skills development. Our prices are posted on the website and apply equally to all companies, large and small. We never negotiate our prices but are open to feedback on our pricing for the next pricing iteration. In rare cases, temporary deviations from the pricing model may be made due to a specific circumstance.

In practice, our pricing model means that our prices are lower than those of our competitor colleagues, especially in these times when information security is a hot topic. However, this is not an end in itself.

4. Information security

When working on behalf of the Business, we need to practice what we preach and in the course of our business we handle sensitive information and are often trusted by our customers through their use of the service. Our customers should never be in doubt that we handle their sensitive information properly.

Our computers and mobile devices are encrypted with full disk encryption and good passwords or two-factor authentication. Good passwords are at least 12 characters long and contain at least 3 out of 4 of the categories upper case, lower case, numbers and punctuation. For mobile phones, these must be protected with a code and have autowipe turned on after a few failed attempts.

Our computers are equipped with antivirus software.

Passwords and keys to which we may have access from clients or partners are only recorded in such a way that it is surrounded by security in the form of at least encryption and password protection. Normally, a password manager is used that requires multi-factor authentication.

At the end of the assignment, we delete all information we have received from the customer as soon as the customer confirms that the information is no longer needed.

We who work in the Business are experts in information security and are expected to treat information accordingly. This applies, for example, to remote work, where we naturally encrypt all data traffic when connecting to public networks and think carefully when choosing which tasks may be appropriate when traveling.