Approach

Information security

Client data and information security are paramount for us to succeed and we take this very seriously and take lots of precautions and have introduced both technology and processes that help us incorporate customer privacy into our analytical discipline to protect our clients against both local and global information security risks.

Technology

  • Controlled access levels which keep a tight control on the authorizations depending on your role either as a client or an internal partner
  • We have very secure Data Management capabilities where all data transactions like transfers, downloads, storage, creation, partitions, indexes of a database is heavily controlled by systems, firewalls and regular backups are done to maintain the data.

Process an Infrastructure

  • Robust Information Controls by following strict internal controls, trainings, audits, monitoring, tracking, physical security and certifications.
  • Prerequisite of agreements and NDAs for clients, vendors & partners is maintained.