We understand the importance of IP and secrecy of our clients’ confidential information.Our utmost priority toward security of data has helped us in gaining the much needed confidence of our clients.We consider project & data confidentiality as a critical element for maintaining a long-term relationship with our clients.

Key areas of our IP protection policy & project confidentiality include:

Non-Disclosure Agreements (NDA’s) with Client

To ensure the security and confidentiality of information, a Non-Disclosure Agreement (NDA) is executed with each client and all private information is respected.

  • What will be collected from client?
  • Why will it be collected?
  • How will we use it? Steps we will take to protect it.
  • With whom it may be disclosed / shared – for legal and security issues etc.
  • Rights for access to information
  • Levels of Risk (data loss, unauthorized alteration, etc.)

Non-Disclosure Agreements (NDAs) with Employees

  • At the time of joining, all employees are required to sign a proprietary information and inventions agreement. Individual NDAs are also signed with every employee on joining
  • Employees cannot disclose any proprietary information directly or indirectly to anyone outside the project team or company, or use, copy, publish, summarize or remove such information from the company premises
  • Employees cannot use any unfair competitive practices upon termination of employment or engage in any business during employment
  • Any confidential information received from third parties and clients are held in strictest confidence and employees are not allowed to disclose or use it, except as necessary to perform his/her obligations as is consistent with third parties
  • Any “invention ideas” and relevant records has to be disclosed to the company and all information and records pertaining to any idea, process, trademark, service mark, invention, technology, computer program, original work of authorship, design, formula, discovery, patent, or copyright conceived or developed has to be promptly disclosed to the company

Data/Network Security

  • Firewalls are installed on our servers to ensure that access is restricted to users within the company premises.
  • Users are authenticated before being given access.
  • Regular virus scans are performed to detect and eliminate virus threats.
  • Regular software updates and security patches, offered by the software vendors, are installed. Log files are maintained which enable effective monitoring and tracking of usage.
  • Access to personal email is disallowed and pen drivers and CD drivers are disabled on all systems.
  • Routine check is being done on developer’s machine to ensure that the system is secured.
  • Back-up of the data are taken at regular intervals and stored in multiple storage media to ensure that the data is secured and the latest data is always available.
  • Authorized IP addresses will only have the access to the administration interface of a web application which prevents unauthorized user from accessing the application.
  • We make sure that all sensitive data is stored in encrypted format into the database.

Confidential Document Control

  • Access to public email systems is disallowed and floppy and CD disk drives/writers are disabled on all desktops. Prior written permission of the Project Manager is required for usage of respective drives
  • Random checks are made on emails that go out of official mailbox that exceeds permitted size (with or without attachments)

Other Security Measures

  • Our development center is fully protected externally and internally with secure and restricted access to all sensitive resources. Every employee is provided with an Identification card.
  • Security staff monitors the facility around the clock and checks the goods going inside and coming out of the development center.
  • Our strict staff selection and personnel policies allow us to build stable and highly professional working teams for both offshore and on-site software development projects and ensure non-disclosure.
  • We perform background checks on each individual we hire. This includes reference check, peer-references, verification of academic records, police record verification, home/permanent address verification on each employee of the company. Bank accounts are opened through our company, this provides us with an extra layer of cross verification.
Inquire Now

Ready to Get Started?

If you have any questions or want to konw more about confidentiality at Cousins Infotech then Contact Us
Inquire Now