Protecting Customers

Protecting Our Customers' Interest

Data Security

  • System Access based on customer's policy
  • Data Transfer via leased line or encrypted email
  • Data Encryption for confidential and above data
  • Data Retention as per customer's policy
  • Data Destruction as per retention policy, carried out with dual control


Data Interface

  • Strict access based on authorisation and need-to-know basis
  • Secured Email Exchange between Clients and Centre staff
  • Independent network & fixed IP for secured application development
  • Remote access to be approved by customers




Physical Access Control

  • Dual control access for critical processes/areas
  • Restricted physical access with access cards and keys
  • Use of CCTV at key areas
  • Visitor Access Control