Work Methodology and Data Security
How do we work? Our game plan
How we maintain data security and privacy?
Workstations are equipped with biometric authentication system and user 2FA authentication system to have multiple layer of security
System vulnerability tests
Workstations are often regularly tested with pen-tests, or known as penetration tests, to identify and safeguard against security loopholes, if any.
Data storage and protection
- Any data shared by clients are stored in SSL/TLS secure cloud buckets of AWS or GCP and it stays in the bucket throughout the project flow.
- From the cloud, the data feeds directly into the advanced cloud based annotation tools and it is annotated in the cloud directly.
- Only authorized experts can have restricted access to the data in the cloud buckets with no option to download the data into work computers.
- Only at the clients end can the annotated data be downloaded from the cloud buckets
Work computers have anti-screenshot softwares installed in all to prevent any screenshots by annotation workforce. Also devices such as mobile phones, cameras etc are restricted in the annotation rooms where work computers are kept.
SOC 2 Type 1, GDPR, CCPA Compliance
Project workflow is designed to achieve SOC 2 Type 1 compliance. We adhere to all GDPR and CCPA privacy and data security norms throughout the workflow