Effectively managing the assets of our clients is of primary importance in our
business strategy. We are proud of our record of zero IP-related complaints in
all the previous projects and always seek ways to improve security.
Confidential document control
- All copies of a client's confidential documents are regularly accounted
for and then deleted when usage needs have expired. All such confidential
documents are returned and disposed of by the client.
- Our development center has password controlled security access.
Dedicated development teams only have access to their relevant work,
and no access to others. No one except the network administrator
is given access to any hardware devices.
- The Non-Disclosure Agreement (NDA) is signed at the start of a business
relationship. Database security - Customer teams install database products
into an isolated data server in a blocked shelf. Access to sensitive
information is limited to key personnel only. The database will not be
used for any purpose other than development.