Quality Policy
To continuously improve the development of technological solutions that enable innovation, transformation, and contribute to the growth of our clients and society, based on:
- Strengthening research and development by promoting the continuous updating of knowledge and a passion for engineering and science.
- Compliance with our clients’ requirements, legal requirements, and business requirements, as well as ensuring that project and organizational objectives are met as expected.
- Implementation of best practices that enable us to develop effective solutions tailored to our clients’ needs, supported by a team of professionals committed to leadership and knowledge sharing.
- High technical quality in the development of our solutions.
In order to provide our customers with compliance, technological innovation, high technical quality, and excellence in training.
Information Security Policy
For BICODE, both our own and third-party information assets are essential to decision-making and the delivery of services to our clients; therefore, we must ensure their confidentiality, availability, and integrity by identifying and managing information security risks and establishing plans that guarantee business continuity.
BICODE and its employees are committed to:
- Establish information security objectives and ensure their implementation by allocating the necessary physical, human, and technological resources.
- Comply with legal, contractual, and business requirements.
- Implement, maintain, and continuously improve the information security management system in order to meet the needs of BICODE and its customers.
- To protect the information accessed, processed, transmitted, stored, presented, communicated, and disclosed by BICODE, in order to mitigate negative financial, legal, operational, or reputational impacts.
- Integrate information security into the Organization’s project lifecycle and ensure the integrity, confidentiality, and availability of information while adhering to authorization levels for accessing and modifying information.
- Train and educate stakeholders on the established information security guidelines in order to foster a culture of security and raise awareness.
- Report and manage incidents and events that affect information security in a timely manner, in accordance with the procedures and channels established in the Information Security Management System.
- Ensure the availability of business processes and the continuity of operations, taking into account the potential impact of disasters or disruptions.
Privacy Policy
BICODE guarantees the protection of rights such as the right to data access, privacy, personal integrity, reputation, and image. To this end, all actions will be governed by the principles of good faith, legality, data self-determination, freedom, and transparency.
Any person who, in the course of any activity—including financial, commercial, or employment-related activities, whether ongoing or occasional—provides any type of personal information or data to BICODE, and where this Company acts as a data processor or data controller, may access, update, and correct such information.
Fraud Policy
At BICODE, we are committed to combating money laundering, terrorist financing, and fraud; therefore, the company will strictly comply with all applicable regulations in this regard for employees, shareholders, customers, suppliers, and other related third parties. BICODE will only enter into contractual relationships with individuals or legal entities that allow for their identification and verification, as a requirement for accessing the products and services it offers or sells, and for any purchases made. Likewise, it will refrain from registering anonymous customers and will ensure that they are not listed under fictitious or inaccurate names.
The mechanisms established in the procedures and in the compliance manual that enable the collection of necessary information and key characteristics for the purposes of preventing, monitoring, and detecting unusual or suspicious transactions shall be applied. Accordingly, the controls shall be applied as follows:
Applicants:Individuals seeking to hold a position at BICODE must meet the requirements set forth in the regulations and procedures so that we may obtain the information necessary to verify their background.
Customers, suppliers, and/or contractors:Individuals or legal entities wishing to be included in BICODE’s supplier and/or customer registry must provide identification and comply with the guidelines required for each process, as well as submit the necessary supporting documentation, in order to verify the information provided.
Partners:If a new shareholder joins the company, anti-money laundering guidelines must be applied to verify the source of their capital contributions.
In addition, checks will be conducted against the following watchlists of individuals or entities that may be linked to money laundering or terrorist financing activities:
- United Nations Security Council Sanctions Lists (UN List) and OFAC List.
- Lists from the Office of the Attorney General
- List of fictitious suppliers
- Lists from the Attorney General's Office and the Comptroller's Office
- Clinton List
In addition, companies must consult other sanctions lists issued by foreign authorities, even if they are not binding. These consultations must be conducted before entering into a relationship with third parties (customers, suppliers, contractors, employees, and partners).

Recent comments