Security and IP Protection

Security and Intellectual Property are important and we at peopleCRM pay a lot of attention to them. We have made sure to implement a security system that is effective and followed by every employee and affiliate. We respect our clients’ intellectual property rights and business data and take all precautions and make all efforts to keep them safe which include security procedures and policies implemented at all levels.

Intellectual Property Protection

Information Non-Disclosure
  • We enter into a Non Disclosure Agreement(NDA) with all clients before exchange of any business sensitive information to ensure maximal level of information security and confidentiality.
  • All the employees sign a Proprietary Information Agreement in addition to an individual NDA when they join the company.
  • No one is allowed to disclose any proprietary information directly or indirectly to anyone unrelated to the project in addition to use, copy, publish, summarize and/or move this information out of company premises.
  • While employed at peopleCRM employees cannot participate in any other business or use any of their knowledge resulting in unfair competition upon end of employment.
Project-based IP Segregation
  • Every project team can be segregated into a separate secure physical location and can work within a dedicated LAN segment.
  • We prevent unauthorized access to our client’s proprietary information through the use of dedicated resources for every project.
  • We prohibit exchange of information between projects through a strong ethical framework within the organization.

Security Policies

Physical Security
  • Employees get access only to specific areas with strict access restrictions in place.
  • Round the clock surveillance and security monitoring has been set up.
  • Photo ID-badge and access card for each employee.
  • Complete fire protection set in place in keeping with the regulations and requirements.
  • Complete no smoking policy at the office.
Data Security
  • Separate, independent data center for E-mail and web-servers.
  • Security Firewall prevents unauthorized access to the network resources.
  • Group Policies used to allow authorized access to PCs and workstations.
  • Permission to access important files and directories is granted to only authorized personnel.
  • Well-established Backup and Recovery Policy. Backups are performed on a monthly and daily basis. Monthly backups are stored in a secure location and the backup logs are properly maintained.
  • The established system of multi-level security management presupposes regular external security audits which enable to reveal the existing and possible security weaknesses.
  • No removable media (including CDs, flash memory storage devices etc.) may go in and out of the facility without the written permission from the administration.
Network Security
  • Only authorized personnel can access the VPN/VLAN/VNC.
  • Real-time SPAM and virus protection for workstations and servers.
  • Important infrastructure elements can be quickly replaced in case of malfunction to minimize system downtime.
  • Wireless LAN in the office is built using the security-enabled technology.