At CrownGlobe, we ensure that the client’s data will remain completely confidential with us. We continuously care for the protection of your private and important Information and documents security. Followings are some of the measures which we have taken for ensuring data security.
Some of the measures are forward looking measures which we plan to implement at various scales of operations.
Non Disclosure Agreement (NDA)
Non Disclosure Agreement (NDA) has to be signed by us and even the separate NDA will be executed between CrownGlobe & their employees to ensure that data does not leaked by the employees and in any unprevented circumstances, employees would be legally liable for wrong done.
Employee Selection and Screening
Background Check would be performed before selecting an employee in order to ensure his integrity.
Login only through authorized IP
Employees would be prevented from logging through other than approved computing devices. Employees can access records only from the office premises.
Defining the user level access
- User level permissions should be defined to ensure that there should not be any unauthorized use of information or data or any documents of the clients
- Frequent changing of Passwords at different intervals
- The access to the data would be discontinued when the data is no longer required
- For Eg. Employee should not be given access to previous year’s data of client
- Use of Information by each of the employee would be recorded
- “Print” Option would be disabled for the users
Audit of policies
- Policies should be strictly followed by every staff of the organization.
- The employees would be given proper information about company’s policies to ensure that they are aware of the information security policies.
- There is timely review of policies so that it can be known that whether it has been followed by the employee or not
- Full time person should be there for vigilance of the activities in order to prevent any wrong done
Document Protection
Physical protection
- Employees should be allowed access only after taking thumbprint so that the physical presence of the person can be tracked at any given point of time.
- The work of employees would be monitored by CCTV surveillance systems
- Employees would not be allowed to enter with recording devices of any kind and they are even not allowed to use paper and pen for to ensure that any information should not be stored in any mode.
- Diskless Computers: The computing devises would be diskless to prevent any unauthorized copy of information.
Logical protection
Antivirus/Malware Software protects the server from virus/malware. All incoming and outgoing data in our IT Infrastructure is controlled by sophisticated firewall. All method of data to external sources is controlled. Removable storages devices like pen drives, smart phones etc. are blocked on workstations.