Register for our newsletter to join 2000+ engineers and stay up to date on all things two-phase.

General Information Security Policy


Like any other organization, Calyos faces a multitude of threats that can compromise the confidentiality, integrity, and availability of our information. These threats, whose nature is constantly evolving, include, among others, identity theft and the theft of confidential information, fraud, industrial espionage, and the theft of intellectual property, as well as the unauthorized use, disclosure, and destruction of information, technical failures, natural events, and human error.

In this context, Calyos implements, maintains, and enforces an information security policy that establishes the implementation of formal information security processes, including risk management, information access management, and incident management. Calyos General Information Security Policy (GISP) aims to:

  • Protect the Company’s informational and IT assets (including but not limited to all computers, mobile devices, networking equipment, software, and sensitive data) against all internal, external, deliberate, or accidental threats and to mitigate the risks associated with the theft, loss, misuse, damage or abuse of these systems;
  • Ensure information will be protected against any unauthorized access. Users shall only have access to resources that they have been specifically authorized to access. The allocation of privileges shall be strictly controlled and reviewed regularly.
  • Protect CONFIDENTIALITY of information. When we talk about confidentiality of information, we are talking about protecting the information from disclosure to unauthorized parties;
  • Ensure INTEGRITY of information. Integrity of information refers to protecting information from being modified by unauthorized parties;
  • Maintain AVAILABILITY of information for business processes. Availability of information refers to ensuring that authorized parties can access the information when needed.
  • Comply with and, wherever possible, exceed, national legislative and regulatory requirements, standards, and best practices;
  • Develop, Maintain and Test business continuity plans to ensure we stay on course despite all obstacles that we may come across. It is about “keeping calm and carrying on!”;
  • Raise awareness of information security by making information security training available for all Employees. Security awareness and targeted training shall be conducted consistently, security responsibilities reflected in job descriptions, and compliance with security requirements shall be expected and accepted as a part of our culture;
  • Ensure that no action will be taken against any employee who discloses an information security concern through reporting or in direct contact with Information Security Management Leader, unless such disclosure indicates, beyond any reasonable doubt, an illegal act, gross negligence, or a repetitive deliberate or willful disregard for regulations or procedures;
  • Report all actual or suspected information security breaches to cybersecurity@calyos-tm.com.

‍By choosing Calyos as your trusted partner, you can rest assured that your data are protected by industry-leading security measures and practices. We are committed to maintaining the highest standards of security and assisting you in safely achieving your business goals while working with us as your 2-phase cooling expert.

For more information about our security practices or to discuss your specific security needs, please contact us at info@calyos-tm.com.