Corporate Graphics International

1750 Tower Blvd
North Mankato, MN 56003

Toll Free: 800.851.8767

Have a question or need to inquire about an order? Fill out the quick form below.


    CGI sets up individual ordering sites for our Fortune 1000 customers to meet their brand guidelines.This is where all product ordering takes place.To receive the link to your ordering site, please email cgncustomerservice@cgintl.com

    Standard reports include:

    • Inventory Management Report
    • Usage Report (e.g. by cost center, user, division)
    • On-time Report
    • Accuracy Report

    Within our online ordering system, Converge™, we have a very powerful reporting tool that allows us to create reports for you that can be viewed, searched, printed, and downloaded in PDF or Excel formats. We can also provide ad hoc reports based on your specific needs. Examples of these reports include: yearly sales comparisons, ordering trends per location, sales by users or divisions, list of users, ship to addresses by state and pricing verification.

    CGI takes securing customer data seriously. CGI’s information security management program is based on the ISO 27001 security framework, ITIL version 3 best practices, and incorporates external regulatory compliance programs such as:

    • PCI Data Security Standard (PCI DSS)
    – Purpose: Protect credit card information
    – https://www.pcisecuritystandards.org/
    • Gramm-Leach-Bliley Act (GLBA)
    -Purpose: Protect consumer data and privacy
    • Health Insurance Portability and Protection Act (HIPPA)
    -Purpose: Protect Personal Health Information
    • Family Educational Rights and Privacy Act (FERPA)
    -Purpose: Ensure students personal information is properly safeguarded and is used only for legitimate purposes
    and only when absolutely necessary

    In addition, CGI’s hosting environment goes through an annual SOC 2 Type 2 (Service Organization Control) assessment by a third party. This audit assesses the suitability of the design and operating effectiveness of security and availability controls in place.