Compliance and Information Security

Security

Our facilities adhere to various applicable global security, health, and safety standards. In addition, we have the ability to scale up rapidly depending on project requirements. Our secure delivery centers are equipped with the latest technology, infrastructure, and dedicated technical staff to ensure our working environment has complete reliability and security for our clients’ data.

Members of our group of companies are ISO 27001-certified. This means key parts of our offices and systems that handle data are on par with international best practices for information security management. We have both physical and non-physical controls to ensure our company and client data are not compromised. Our back-office staff overseas are trained on security protocols and we continuously run educational sessions to keep abreast of various threats within our industry. We do not use third party contractors to complete any work.

Physical Controls at Our Offices

  • Biometric scanners and access cards are required to enter our offices.
  • Only authorized personnel are allowed to enter the office and processing center.
  • Physical documents, books, and other devices are prohibited in the processing center.
  • The entire office is monitored by CCTV.
  • All PCs are desktops running a ‘dumb terminal system’.
  • Ability to save and store data on the PC is disabled.
  • CD Rom and other drives (USB) have been removed.
  • Access to physical/removable drives (external hard drives) have been disabled.
  • Printers and scanners are also not available within the processing center.
  • Staff are required to keep personal belongings including bags, books, or mobile devices in secure lockers provided outside the main processing center.

Non-Physical Control

  • Internet activity is heavily controlled with websites required to be added to a “whitelist” before they can be accessed.
  • Staff are unable to access personal emails from the office and work emails are unable to send data outside the office.
  • Our intranet, internal portals, software, and sites have IP Authentication in place so that no one can access these records outside our office premises.
  • Access to our internal software is password protected with strength measurement. Passwords are also required to be updated on a regular basis.
  • All terminals include screen snapshots and are regularly audited to ensure staff are following security guidelines.
  • All our terminals and servers are installed with firewalls, antivirus software, intrusion detection software, and prevention systems to minimize any exploits or attacks.
  • Our security software is kept updated at all times and when required.
  • All PCs within our organization have an auto-lock feature to ensure they are not kept unlocked.
  • Wireless connections are prohibited within our back-office in India.

Servers and Support

Our servers are located in Amazon data centers globally hosted at sites in the United Kingdom. Our Service Level Agreement with our server provider ensures:

  • A minimum of 99.99% uptime.
  • All servers have hardware firewall protection software.
  • Enterprise class firewalls provide fully redundant state-full failover to ensure the highest security and reliability.
  • Our dedicated servers are protected by Source fire Intrusion Detection and Prevention System (IDS/PS) ensuring our server’s ongoing security.
  • On-site and off-site continuous data protection services ensure our data is protected 24/7.
  • Our server provider also offers our firm 24/7 support.

Training and Education

  • All staff must sign a confidentiality agreement in regards to our security protocol relating to data, client information, and business insights.
  • All staff have a duty to report any breach immediately so the appropriate action can be taken.
  • All staff must not share information outside the organization. If the information is shared within our team, it must only be in reference to completing the work.
  • All staff must attend and satisfactorily complete regular data security training sessions.

We believe we have taken strict measures to ensure maximum security and protection of both our company’s and clients’ data. If you have any questions regarding our risk parameters, please feel free to contact us and we would be more than happy to discuss.