Quality

Quality

Quality

We will continue to be a reliable partner for our customers with our understanding of continuous improvement and development through the participation of all our employees in business goals and our accumulated experience. Trace records of programs, applications, user transactions and data flow in the information system network are collected and stored for the security of the documents containing the technical details of the products produced within the context of our quality management system. We strive for excellent quality in products and services.

ISO 9001:2015

Our company has ISO 9001:2015 quality management system certificate.
In order to provide the highest quality and efficient production and service at national and international standards; Each product produced is meticulously controlled from order entry to shipment, each of these controls can be documented and transmitted to the relevant departments of the customers upon request.

ISO 9001:2015
Trace

Trace

Metamold issues report under the ID created for our products covering all the processes involved in making them together with trace data that allows us to track post-production maintenance or any operation made. The measures we have adopted to ensure the quality of our products apply to all stages of manufacture from initial design to final production. We record every step of mould production in our project operations from design to final production and store them in the product ID. This allows us to keep a permanent record (a trace) of all a product’s process stages.

Information Security

In order to protect the knowledge and technology that have been produced;

  • Entrance to the production areas of our company is prohibited except for the production personnel. Thanks to our encrypted doors, the entrance to the production areas are under control.
  • In terms of data security, no external data storage devices can be inserted into or used on computers.
  • All data are backed up in the cloud against any external threat.
  • Backups of all our data are applied with virtual servers. Even access to the network is subject to MAC filtering.
Information Security