ISO certificates

As a company specializing in complex projects for well-known international companies and global market leaders, we recognize the need to maintain the level of our performance and business conduct in line with the best practices worldwide, presented in ISO and SR standards. These principles are incorporated into our management and organizational culture. In this way, we take full responsibility and are accountable for the impacts that our decisions and activities may have on the stakeholders, society and the environment as a whole.


We believe our integrated management system and our certificates – internationally recognized demonstration of commitment to sound, ethical, and socially responsible behavior – will allow us to stand out from the competition and positively strengthen our image with all our stakeholders – employees, owners, customers, providers, government, competitors, society and environment as a whole.

Quality and Environmental policy

Elsys Eastern Europe (EEE) quality and environment policy, approved in Management Review, is articulated around four axes:

  • To satisfy the customers,
  • To control the company growth by maintaining financial profitability and ensuring the evolution of internal practices,
  • To reduce the environmental impact of all our activities, products and services,
  • To continuously improve internal and outsourced processes based on a Quality and Environmental Management System that complies with ISO 9001:2015 and ISO 14001:2015 standards.

Taking into account the strategic importance of the missions carried out for our customers, we all work respecting scrupulously the confidentiality of information and all applicable statutory and regulatory requirements.

We exercise due diligence to ensure ethical and socially and environmentally responsible sourcing of products and services in our supply chain. These actions and commitments are summarized in the company Supplier Policy.

Information Security policy

Information management is a critical factor in business success of the Elsys Eastern Europe. How information is acquired, processed and shared, defines major components of our company’s core activities. This requires effective information security management to ensure the confidentiality, integrity and availability of the all information we deal with.

This information security policy presents our approach to information security management. It provides the framework for defining information security objectives, risk management and describing the responsibilities necessary to safeguard the security of the Elsys Eastern Europe’s information.

To ensure information security, Elsys Eastern Europe is committed to the implementation and effective maintenance of Information Security Management System in accordance with the requirements of ISO/IEC 27001:2013 standard.

The management of Elsys Eastern Europe demonstrates this commitment by allocating appropriate resources to this end and by striving to continually improve our information security practices. Elsys Eastern Europe invests in the development of the key resource – the employees, thus ensuring their awareness of information security and adherence to ISMS policies.

Elsys Eastern Europe is also highly committed to preserving the confidentiality, integrity and availability of documentation and information provided by, created by and held on behalf of third parties, as part of the project realization.

These commitments are made in the recognition that adherence to these principles is consistent with the core values of Elsys Eastern Europe and critical to its business and compliance with legal, regulatory and contractual requirements.

By complying with these obligations, requirements and codes of business, through synergy and trust, we are building success and proving that we are a reliable business partner.

Social Responsibility policy

Through our transparent and ethical behavior we strive to:

  • contribute to sustainable development, including society’s health and welfare;
  • take into account all stakeholders’ interests, as they are integral to our business;
  • comply with the applicable legislation and remain consistent with international norms of behavior;
  • maintain respect for human rights;
  • provide a framework for defining our objectives and an adequate Code of conduct.

The management is responsible for the implementation of these polices and will make the necessary resources available to realize our corporate responsibilities and achieve continual improvement. The responsibility for our performance on these policies rests with all employees throughout the company.


1Clock domain crossing – issues and how to overcome themDD
2Scheduling techniques and their implementation for queue servicingDD
3Functional safety approaches implementation  in digital designDD
4Temperature sensor IP – Analysis, modeling and verificationAMS
5Bandgap reference IP – Analysis, modeling and verificationAMS
6Voltage regulator IP – Analysis, modeling and verificationAMS
7Internal oscillator IP – Analysis, modeling and verificationAMS
8Power-on Reset IP – Analysis, modeling and verificationAMS
9IP verification – MAC merge sublayer IP – MMSL – Link Layer Discovery Protocol control – LLDPDV
10IP verification – MAC merge sublayer IP – MMSL – MAC RxDV
11IP verification – MAC merge sublayer IP – MMSL – MAC TxDV
12SoC integration – 3PIAS ProjekatDD+DV
13SoC integration – ARM – Cortex M0 platform Integration using ARM SDKDD+DV
14SoC integration – ARM – Cortex M3 platform Integration using ARM SDKDD+DV
15SoC Verification – interdisciplinary themes – SW coverage collection and analysisDV
16SoC Verification – interdisciplinary themes – CPU instructions provided by SV TB instead of reading from Memory; (SV + ARM architecture)DV
17VIP Development – PCI ExpressDV
18VIP Development – DDRDV
19VIP Development – EthernetDV
20VIP Development – USBDV
21VIP Development – CSIDV
22VIP Development – DSIDV
23VIP Development – UNIPRODV
24VIP Development – I3CDV
25VIP Development – SLIMbusDV
26VIP Development – HDMIDV
Please note, although thesis are created in collaboration with professors, you need to get final approval by your UNI professor.