LOGIN :
   
 
  Home > Security
  • NDA                                                           
  • CLIENT -BASED SEGREGATION        
  • PHYSICAL SECURITY                           
  • DATA PROTECTION                             
  • NETWORK SECURITY                          
  •  
     Why Choose ?
    Read More
     
    Security

    At information security is vital and is treated as an asset in its own right. We understand a truly effective security as a system that is followed by every employee. We respect the sensitivity of our customer's data and intellectual property rights and we undertake comprehensive measures to protect and safeguard them.

    A whole range of security procedures and policies are accepted at different levels.

     
     
     Information Non-Disclosure (NDA)
       
    We initiate an NDA signing before business sensitive information exchange with each client to provide the maximal level of information security and confidentiality.
    Each employee is required to sign a Proprietary Information Agreement as well as an individual NDA at the moment he or she joins the company.
    The disclosure of proprietary information directly or indirectly to a person not involved in the work along with usage, copying, publishing, summarizing and/or moving this information out of the company's premises is strictly prohibited.
    The employees are not allowed to participate in any other business during their employment and are not allowed to use any of their knowledge in the way that may lead to unfair competition upon termination of their employment.
       
     
     Client / Team -based Segregation
       
    We use dedicated resources for each client, this enables prevention of unauthorized access to the client's proprietary information.
    We have a strong ethical framework that exists inside our company and this ensures that no information is exchanged between Recruiters.
       
     
     Physical Security
       
    Each employee is provided with a photo ID-badge and an access card with easy-to-identify bands.
    A 24x7 security monitoring and surveillance system are installed
    Fire protection is organized according to the regulations and requirements, all the necessary facilities can be easily accessed in case of fire alarm
    The whole territory of the office is a non-smoking area
       
     
     Data Protection
       
    Unauthorized access to the network resources is prevented via Security Firewalls
    Authorized access to PCs and workstations is organized using Group Policies
    Only authorized personnel has the permission to access important files and directories
    E-mail and web-servers reside on an independent data centre.
    Established Backup and Recovery Policy. Backups are performed on a daily basis. Monthly backups are stored in a secure location and the backup logs are properly maintained
    The established system of multi-level security management presupposes regular external security audits which enable to reveal the existing and possible security weaknesses
    No removable media (including CDs, flash memory storage devices etc.) may go in and out of the facility without the written permission from the administration
       
     
     Network Security
       
    The access to the VPN/VLAN/VNC is restricted to the authorized personnel only
    Workstations and servers are SPAM- and virus-protected in real-time mode
    Important infrastructure elements can be quickly replaced in case of malfunction to minimize system downtime
       
     
    Home | Company | Service | Security | Candidates | Request a Free Trial | Disclaimer | Privacy Policy
    Copyright 2013 People Edge | www.peopleedge.in. All rights reserved