Whenever businesses opt for services like accounting, bookkeeping, payroll or taxation, a lot of sensitive data needs to be shared with the service provider. At Initor, we handle such data with extreme caution and ensure complete security and confidentiality of client data.

Data privacy and data protection of our clients is of utmost importance for us. To accomplish this we meet all the standards of GDPR and we are a certified GDPR compliant company. We have extremely stringent policies for data security and confidentiality.

We also have ISO 27001-2013 certification for maintaining the most standard Quality Measures for Information Security.

Certified GDPR Compliance

ISO 9001-2008

ISO 27001-2013

Data Security

As a GDPR compliant company, we have defined robust IT and Infrastructure policies to implement physical as well as IT related aspects of data security.

Physical Security

  1. We have closed circuit cameras installed in our premises for 100% surveillance of our work place.
  2. The entrance of our workplace has an access control system which permits only controlled entry into the production areas.
  3. The access to our server room is controlled and restricted. Only the IT team is authorized to enter the server room. The entry/exit is managed by authorized access cards only.
  4. None of our workstations have CD R/W drives.
  5. We strictly follow the “No External Device” rule due to which we have disabled the USB ports at all workstations.
  6. We ensure complete protection of the Document storage area.
  7. Our company is a mobile free zone and it is compulsory for all employees to keep their mobile phones outside the work zone.

IT Security

  1. All workstations are installed with the latest anti-virus software which checks for updates daily. We have a daily quick scan scheduled for each workstation. Boot scan and full scan of each workstation is scheduled for a weekly and monthly basis respectively.
  2. We have anti-malware software on all computers which does a quick scan twice a day.
  3. Default windows firewall software is configured to protect access to company’s network.
  4. Every machine is password protected. It is mandatory for each user to change the password of his/her machine every 42 days.
  5. The access to client information is highly restricted. Some authorized users may have access to selective information of the clients they are working for.
  6. We have different account management policies like deactivation of accounts after separation of affiliation. The account access requirements are reviewed regularly for changes.
  7. We have implemented session controls on all the workstations for additional security. If any workstation is unattended for 5 minutes, the server is configured to automatically lock the workstation. It then requires re-authentication to unlock again.
  8. We have multiple backup operations scheduled to prevent the loss of data like.
    • Previous Version Backup : Scheduled for twice a day
    • Differential Backup : Scheduled weekly
    • Full Backup : Scheduled Monthly
  9. No user is allowed to access personal email accounts. The access and usage of many internet sites is also restricted and controlled.
  10. We believe in a paperless environment because we are an eco-friendly company and additionally it ensures better security of data.
  11. With IP authentication we restrict outsider access to confidential information within the office.

Confidentiality

  1. All our employees are bound by stringent non-disclosure and non-compete agreements owing to our privacy policy.
  2. We have drafted a detailed “Data Protection Policy” in compliance to the GDPR. We consider all the data and information provided by the client as confidential and strictly the property of the client.
  3. We have made our company a zero data breach zone with our stringent “Data Breach Policy”. As per this policy no one at Initor shall ever disclose any client information to any third party without the prior consent of the client.
  4. Our “Data Retention and Destruction Policy” states that all raw and processed data whether in electronic format or in printouts will be destroyed once the work is over.
  • error: Content is protected !!