​Data Security

We believe that security is the most important concern for our clients. We have implemented various controls and measures and our team monitors them regularly to ensure that data security is delivered as per our commitment. We have always been highly conscious of handling sensitive client information with the utmost confidentiality.  

The following major areas are covered:

  1. 1. Physical security
  2. 2. Data/Network security
  3. 3. Confidentiality

​Physical Security

  • ​​Access to work areas is controlled by proximity access card system. Each employee is given a keycard that has their photograph, contact details, etc. and every entry and exit is duly recorded.
  • ​There is a single entry/exit point, which is monitored 24 X 7 by trained security professionals.
  • ​Latest CCTV cameras installed in all ​areas and important public areas in our office.
  • ​Fire security and alarm system consisting of smoke and heat detectors, sensors, and a complete control panel in the guard room. Fire-fighting equipment is also installed.
  • ​24-hour security guard at the building.
  • ​Random audits are carried out to ensure security policies are followed. Non-compliance of the same leads to disciplinary action.

​Data/Network Security

  • ​Every employee has a unique username and password to access his/her workstation.
  • ​Electronic devices such as mobile phones, tablets are not allowed on the ​work floor. USB ports and other media drives are disabled as well.
  • ​Continuous monitoring of the web traffic and disciplinary actions taken for any violations.
  • ​Access to the local drives of our server are restricted based on the process the employees are assigned.
  • ​Appropriate backup mechanism in place to prevent data loss.
  • ​Weekly updates to the anti-virus software carried out on every system.


  • ​Every employee signs a non-disclosure agreement at the time of recruitment and any breach of the same leads to termination of employment.
  • ​Restricted access to internet and websites ​allowed only if it is a process requirement.
  • ​Continuous monitoring of web traffic and disciplinary action ​taken for any violations.

​Contact us today to know more about how we can help you