At Tata Interactive Systems, our focus is on continuous process improvement with a view to deliver consistently better products every time.
With over 25 years of learning experience, processes drive all TIS projects - binding technology, human resources and products in every project in the framework of a well-defined project life cycle. We are a system that has consistently raised our performance bar; TIS is the world's first e-learning company to be assessed at Level 5, the highest possible rating, in both SEI CMM (Capability Maturity Model) and SEI P-CMM (People-Capability Maturity Model). TIS is an ISO 9001 and ISO 27001 certified organization.
Software and people processes at TIS allow for detailed measurement, analysis, and continuous improvement for predictable quality. This level of process maturity reduces our defect density on a continuous basis and helps us serve our clients better. Our People Capability Maturity Model (P-CMM) level translates into continuous evolution of people and processes, thus enabling the organization to improve levels of motivation and competencies among employees.
The multi-faceted quality initiatives at TIS extend beyond project schedules and defect density, spanning every aspect of business excellence from customer relationships and product innovation to environmental concern and social responsibility.
PROJECT LIFE CYCLE: DEPENDABILITY, TRANSPARENCY, AND ROBUSTNESS
All projects at TIS follow a well-defined lifecycle. Each stage in the cycle is anchored by a set of transparent and robust processes. The transparency in the system affords clients a complete view of a project and helps track work progress, schedule, and quality throughout its implementation.
DATA CONFIDENTIALITY, INFORMATION SECURITY, AND DISASTER MANAGEMENT
TIS ensures the security of all information, whether printed or written on paper, stored electronically, transmitted by mail or by electronic means, shown in films, or spoken in conversation. In today's competitive business environment, TIS is aware and actively safeguards against threats to information security and data confidentiality, whether internal, external, accidental, or malicious.