Quality

Quality

Quality

With the participation of all our employees in business objectives and our accumulated experience, we will continue to remain a reliable partner for our customers through our approach of continuous improvement and development. In the context of our quality management system, logs of programs, applications, user actions, and data flow in the information system network are collected and stored to ensure the security of documents containing technical details of the produced products.

We strive for excellent quality in products and services.

ISO 9001:2015

Our company holds the ISO 9001:2015 quality management system certification.

With the aim of providing the highest quality and most efficient production and service in line with national and international standards, every product is meticulously inspected from order entry to shipment. Each of these inspections is documented and can be shared with the relevant departments of our customers upon request.

ISO 9001:2015
Trace

Trace

Metamold creates reports containing trace data that allow tracking all production processes and any maintenance or operations performed after production. These reports are created under the identity prepared for the products. The measures we take for quality assurance apply to all our processes, from the initial design to final production. In project operations, every step of mold production, from design to post-production, is recorded and stored in the product identity. This ensures that the process stages (trace) of the product are permanently preserved.

Information Security

To protect the generated information and technology:

  • Access to our production areas is prohibited for anyone other than production personnel. Access to production areas is controlled through our password-protected doors.
  • For data security purposes, no external storage devices can be connected to or used on computers.
  • All data is backed up in the cloud to safeguard against any external threats.
  • All our data backups are performed using virtual servers. Even network access is subject to MAC filtering.
Information Security