Your Data Security Measures

INFORMATION AND DATA SECURITY

We prioritize the security of your data and our resources with exceptional diligence. Recognizing the need to protect certain documents and information from unprivileged individuals and automated systems, we have implemented rigorous safety controls and methodologies across our business units:

  1. We don’t use cloud based storage services (Google, Dropbox etc.) for sensitive data ( unless specified otherwise by Customer)
  2. We don’t use outsourced SMT (Statistical Machine Translation Engines) unless specified otherwise by Customer
  3. We don’t Build, Train, and Deploy Machine Learning systems and process datasets with use of cloud based third parties engines unless specified otherwise by Customer
  4. We are using only secured transmission protocols for external communication
  5. Strong files encryption within local storages and Distributed DMS
  6. Robust access privileges to our online platforms (profiles, roles, sharing rules)
  7. Access control on databases records level
  8. MFA authentication for all access to sensitive data
  9. Data destruction and disposal procedure in place
  10. Intrusion prevention system
  11. Multilayer data loss prevention (DLP) systems and procedures in place
  12. Data anonymization procedures (important while outsourcing projects)
  13. Regular Security & Confidentiality Audits
  14. Data Centers in Europe and Asia (depending on data security requirements, certain DC is selected)
  15. Full GDPR compliance
  16. Data protection compliance in line with regulations of the countries out of Euro-zone
Scroll to Top
Scroll to Top