Is my sensitive information secure? How are my IPs protected?

Is my sensitive information secure? How are my IPs protected?

International Parallel Sourcing and its vendors pay utmost importance to the security, confidentiality and intellectual property requirements of its clients.

Intellectual Property – We believe all assets and information provided by you, and all work created by us and our vendors whilst working on your tasks are exclusively the property of yourself.

We understand truly effective security as a system that is followed by every employee and affiliate. We deeply respect our customers’ business security and take comprehensive measures to safeguard them. A whole range of security procedures and policies are accepted at different levels.

Our vendors are capable of providing you a high security environment and data security that meets the most rigorous standards of leading global security-conscious organisations such as financial services companies.

Our comprehensive and customised security plan at the analysing phase of our service delivery model can cover all your security concerns.

Our security net includes (but not limited to):

  • Physically secure offices
    • Security gates.
    • Armed guards.
    • Security cameras.
    • Bio-metric, RFID & Photo ID detection systems (or other systems) for secure entry & exit (to prevent entry or exit of unauthorised persons).
    • Segregation of secured and common areas. Separate swipe cards for each area.
    • Emergency plan – staff training on emergency procedures, smoking alarms, fire extinguishers … and vendor’s alternative office.
  • Stringent administrative procedures
    • Clear Desk, Clear Screen Policy.
    • Bags, mobiles phones, camera, laptops, PDAs or any electronic gadgets are not allowed into the operation floor. Staff members are provided with their personal lockers outside the operating floor.
    • Random checks of employees and systems.
    • All email sent and received by employees are to be read by senior management. You can also request direct access to your employees’ emails.
    • Limited print permissions – Only few designated staff members are permitted to print. Staff members are not allowed to bring in or take out any paper, printout or written documents without any permission.
    • Limited staff access to database – Only few designated staff members are permitted to draw data from the database.
    • The process is divided and designated amongst different staff members, and each staff receives information only in relation to the task he/she is performing. Furthermore, our employees can be located in different areas, typically do not know each other, and do not have the ability to communicate or exchange information.
    • Part Outsourcing – Outsource portion of the process, which is less sensitive, and keep more sensitive portion of the process in-house.
    • Asset Management – Users register, user password management, and return asset policy.
    • Once the data and documents have been used they are destroyed.
  • Systems & Technologies
    • Firewalls.
    • Antivirus software.
    • Data encryption.
    • Secure web site, FTP and/or custom software can be used to transfer data.
    • Data Leak Detection & Prevention (DLDP) systems designed to detect and then prevent any potential breaches. These systems protect your data from being acquired by anyone other than people you’ve specifically assigned that information to. Including locked down USB ports.
    • Secure and managed internet connectivity and locked VPN only access via your network. (Meaning all your internet access rules are automatically applied to our workstations).
    • Thin client mode – All work is done on the central servers. Nothing ever leaves central servers. Images, data and all processing stay on a secure, firewalled central server. The server can be based locally or offshore.
    • DISASTER RECOVERY: Hot Back-up. In practice, if the server that is running a software process crashes, another server on the network can instantly take over without loss of any information.
  • Strict vendor and staff screening – Background checks on all staff members are performed.
  • All staff members are trained on security procedures during induction.
  • The employees, administrators and professionals working on your project at International Parallel Sourcing and at its vendors sign intellectual property, confidentiality and non-disclosure agreements at the onset of a project.
  • A large number of our vendors comply with ISO 27001 Standards (IT Security Policy).
  • On the floor presence of your staff (virtual captive model), or International Parallel Sourcing independent representatives (not available in all areas), or an independent security officer (not available in all areas), or any combination of each.
  • Regular security audits can be carried out using internal or third party security auditors (onshore or offshore auditors).
  • Many other tools.

    The availability of above mentioned security tools varies from vendor to vendor.

After you sign up, see a list of all your subscription emails. Unsubscribe instantly.