Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact Us
English (US)
US English (US)
CO Spanish (Colombia)
  • Home
  • Cibersecurity and Compliance

How Does wolkvox Manage Personnel Selection and Offboarding in Terms of Security?

Written by Jhon Bairon Figueroa

Updated at November 6th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • wvx Digital Interaction
  • wvx Voice Interaction
  • wvx Conversational AI
  • wvx Control Interactions
  • wvx CRM
  • wvx Agent
  • wvx Studio
  • Cibersecurity and Compliance
  • Release
    wolkvox Manager release wolkvox Agent release wolkvox CRM release
+ More

Table of Contents

Description Features

Description

wolkvox implements a comprehensive personnel management process—from recruitment to offboarding—with a strong focus on information security and compliance with its Information Security Management System (ISMS). This process includes rigorous evaluations during hiring, ongoing security training, and clear offboarding procedures, ensuring that employees understand and comply with security policies throughout their relationship with the company.

The goal is to protect assets and sensitive information, foster a culture of security, and ensure that commitments made are upheld even after the employment relationship ends.

 

Features

Recruitment and Hiring

  • Profile-based evaluation: Candidates are selected based on a Job Profile that includes technical and security requirements.
  • Role and criticality matrix: The criticality level of the position is defined along with corresponding security validations (e.g., background checks, confidentiality agreements).
  • Confidentiality agreement: All employees sign a confidentiality agreement at the start of their employment, committing to protect wolkvox’s information.

 

Training and Security Culture

  • ISMS training plan: Employees receive training on policies, procedures, and best practices for information security.
  • Weekly communications: Security reminders and updates are sent regularly to reinforce awareness and keep security top of mind.
  • ISMS compliance: Strict adherence to wolkvox’s Information Security Policy is promoted across the organization.

 

Performance and Disciplinary Actions

  • Compliance monitoring: Employee adherence to security policies is evaluated, and potential violations are identified.
  • Violation and sanction scale: The internal work regulations establish a disciplinary procedure with sanctions proportional to the severity of the violations, ensuring individual accountability.

 

Employment Termination

  • Secure offboarding process: Upon termination, the confidentiality commitment made in the initial agreement is reinforced.
  • Access revocation: Access to systems, data, and company resources is immediately disabled to prevent security risks.
  • Asset return: The return of equipment, documents, and any other company assets is ensured, guaranteeing that no sensitive information remains with the former employee.

 

 

secure process staffing management

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Are Technical Controls Implemented for Password Management, Such as Minimum Length, Complexity Rules, Forced Change on First Use, Periodic Rotation, and Preventing Reuse of Previous Passwords?
  • How Is Physical Access Management to Wolkvox Facilities Conducted?
  • How Does wolkvox Conduct Internal and External Audits Related to the ISMS?

2025 Wolkvox

Information security policy | Privacy Policy

Expand