During initial investigation and requirement gathering a lot of process information and data are collected from customers for designing and development of the business applications. We protect and ensures the security of all information, whether printed or written on paper, stored electronically, transmitted by mail or by electronic means, shown in films, or spoken in conversation.
We have established a comprehensive Information Security Policy within the organization that comprehensively addresses and ensure the confidentiality, integrity, and availability of both vital corporate and customer information.
In today’s competitive business environment, Access Infotech is aware and actively safeguards against threats to information security and data confidentiality, whether internal, external, accidental, or malicious.
Our robust Information security and confidentiality policy help us to protect process information and related data from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction at each step of project execution.
We have firm belief that protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. But at the same time it is ensure that the information is available to the authorized people as and when required.
Access to public email systems is disallowed and floppy and CD disk drives/writers are disabled on all desktops. Prior written permission of the Project Manager is required for usage of respective drives and any external media. Regular checks are made on each email that goes out of official mailbox with or without attachments. Also the movement of external/secondary Medias is controlled by security personnel.
The Access Infotech development Center is fully protected externally and internally with secure and restricted access to all sensitive resources. Every employee is provided with an authentic entry. Security staff monitors the facility around the clock and checks the goods going inside and coming out of the development center.
Our strict staff selection and personnel policies allow us to build stable and highly professional working teams software development projects and ensure non-disclosure. We perform background checks on each individual we hire. This includes reference check, peer-references, verification of academic records, home / Local address verification on each employee of the company.
Following are the security abstraction levels:
Physical Personnel Administrative Hardware and Software Information System