Manage your account parameters, notification preferences, privacy, and access control for BIM projects.
Personal and professional data.
Configure access to your data.
Visibility of your profile to other team members.
Control project permissions.
Active projects with coordinator access.
For assistance with your account settings, contact support.
Terminological precision and interpretation conditions for our engineering and BIM methodology services.
The terms "Structural Planning," "Building Information Modeling (BIM)," and "Load Analysis" refer exclusively to engineering consultancy and technical documentation services. They do not include interior design, real estate promotion, or sales management services.
References to "sustainable materials" correspond to the technical assessment of their structural and environmental suitability within BIM models. Final specifications are subject to availability, local regulations, and project manager approval.
This definition applies to structures with a built area exceeding 2,000 m² or requiring special load analysis in accordance with the current Technical Building Code. The final qualification is determined by our engineering team.
Our implementation of the BIM methodology is carried out under ISO 19650 standards and uses licensed software. The deliverables (models, plans, reports) are consultative in nature and must be validated by the agents responsible for project execution.
For inquiries regarding the scope of these terms, you can contact us.
At Bienka Architecture, the integrity and confidentiality of our project and client information is a fundamental priority. We implement rigorous protocols in all phases of our work.
All BIM models and structural data are stored on secure servers with end-to-end encryption and role-based access control.
Multi-factor authentication systems and granular permissions ensure only authorized personnel access sensitive project information.
Billing and payment processes are conducted through certified gateways, complying with the highest standards of financial security.
We have a documented protocol for the identification, containment, and notification of any security incident within a maximum of 24 hours.
Our security policies are aligned with industry best practices and are reviewed periodically. For more details, consult our Privacy Policy.