Register
X

Forgot your password?  Forgot your username?  Create an account

X

Fields marked with an asterisk (*) are required.

Data Security

Data Security at G.O.A

Are your concerns about data security hindering you from outsourcing data entry? You can be assured about complete data security at Global Outsourcing Agency, one of world’s largest providers of quality data processing solutions.
Whether it is business continuity plans, data security policies or sufficient backup systems, Global Outsourcing Agency has taken all the possible measures when it comes to data security, as keeping the data of customers confidential, has been the primary goal of Global Outsourcing Agency.

Key Data Security Measures

Data is completely secured with the help of email, folder and file encryption. This ensures the confidentiality of our customers’ information.
After the data entry has been completed, we will return the customer’s source documents, destroy it or send it back to the customer.
We strictly follow the customer’s instructions in this matter.
Global Outsourcing Agency has taken the required security measures to ensure that a regular backup of the data is saved. G.O.A’s backup data is stored in a different location and not in the location where the data entry work is carried out.
The data entry operators at Global Outsourcing Agency or G.O.A Affiliates are not given access to the source files. With the aid of data processers and scanners, the source documents sent by the customers are divided into several TIF images and then distributed among the team of data entry personnel at G.O.A. No individual data entry operator at G.O.A will have access to a complete document sent by the customer.

Data Security

All the data entry operators and companies that work for G.O.A sign a confidentiality agreement at the onset of every data entry project.
Regular penetration tests and security audits are carried out to ensure that data security is maintained at all levels.
In the unlikely event of a security breach, the G.O.A management will immediately report the problem to the concerned customer.
The IT team at G.O.A has set up the required processes, procedures and security devices to ensure the privacy and integrity of customer data. Software and other configurations are set up based on customer or project requirements.
A daily backup of data is taken

Business Continuity/Disaster Recovery Plans

In case of software/hardware failures and natural calamities causing disruption to our business, we will ensure that your work is carried out without a delay, from our other delivery centers. To ensure business continuity, we have setup data recovery, disaster recovery and physical recovery policies.

Personnel Security

The data entry personnel at G.O.A and its affiliates have been given ID cards that are verified when they enter into the office.
Training on the importance of maintaining the security of customer data is given to every data entry operator.
Personnel who have access to customer data sign non-disclosure and confidentiality agreements before starting work on the data entry project.
G.O.A has prohibited the use of CDs, floppies, USB drives and personal laptops within the office. No document can be brought into or taken from the office. Spot checks are conducted on a daily basis on employees at the premises.

Network Security

Stringent security policies are followed when it comes to network access and passwords. The IT team ensures that complete network security is maintained.
The system access policies at Global Outsourcing Agency offer limited access to only a few personnel.
External drives such as pen drives and floppy disk drives have been disabled on every system. Regular spot checks are also conducted to ensure that customer data is completely secure.
The IT team at G.O.A has installed firewalls and the latest versions of antivirus software.
Global Outsourcing Agency’s systems run on a secure sever. A secure 128-bit SSL encryption is used.
Every system used at G.O.A is password protected, to ensure that only authorized personnel can access the systems within G.O.A.
To prevent unauthorized access, the systems and network at G.O.A are password protected at multiple levels. The passwords are also changed on a frequent basis to ensure security.
In case of an unforeseen emergency, the G.O.A network can be backed up and stored in a secure facility.
contact