Protecting Our Customers' Interest
Data Security
- System Access based on customer's policy
- Data Transfer via leased line or encrypted email
- Data Encryption for confidential and above data
- Data Retention as per customer's policy
- Data Destruction as per retention policy, carried out with dual control
Data Interface
- Strict access based on authorisation and need-to-know basis
- Secured Email Exchange between Clients and Centre staff
- Independent network & fixed IP for secured application development
- Remote access to be approved by customers
Physical Access Control
- Dual control access for critical processes/areas
- Restricted physical access with access cards and keys
- Use of CCTV at key areas
- Visitor Access Control