Next to price and accuracy, the most common question regarding outsourcing is data entry security. Your company information is a valuable commodity that must be protected. It is understandable that there would be a hesitation to provide access to this wealth of information to a third party in hopes it will not be compromised.
Techspeed understands our client's concerns and has taken pioneering steps to create technology to eliminate the risk of outsourcing your information processing. Our data security services protect your information from all external threats as well as internal threats within your own organization. No other organization can provide our 100% guaranteed security solution. See our ImageFracture and presentation . What better company to protect your data than a company that specializes in data security technology as one of their primary skill sets?
In addition to our security technology, we maintain a maximum physical security infrastructure. See our Security and Infrastructurse section. We have gone to great lengths to protect our client's data and provide outstanding data security management. There has not been a single incident of a data security breach in the 32 years of service to our clients. We are constantly finding new ways to expand our knowledge and technology in data security to support our clients and the IT industry.
SECURITY & INFRASTRUCTURE
TechSpeed understands the importance of our client's security and proprietary information. We have gone to great lengths to address this issue. In the 32 years in business TechSpeed has never lost a document, electronic data file or had a breach of confidentiality.
Access to the TechSpeed facility is highly restricted through a number of controls. The property grounds have 8 security guards staffed 24/7 at all entrances and exits to the property, as well as at the entrances to the building. There is also a TechSpeed staffed guard at the office entrance.
All of our critical access points such as the office entrance and server room, are protected by a high end biometric security system. This tracks the whereabouts of all staff members within the office.
TechSpeed's security guards check all personnel belongings before they enter the reception area. Personnel are also checked as they leave the facility to check for any company property or electronic media attempting to be removed. All work stations have no removable media devices. This prevents staff from saving information to media that they can remove from the premises.
Techspeed has an elaborate camera security system with 16 surveillance camera points throughout the facility. This system visually monitors all areas of the facility. Authorized personnel monitors the 16 cameras from a camera command center. All video is recorded and archived. This system also allows management to log onto a secure online interface and monitor all 16 camera points simultaneously from anywhere in the world.
Work Station Monitoring
TechSpeed has implemented workstation monitoring. This allows the ability to observe and store all activities for each work station. With this information, we do routine audits of workstation activity to document security policy compliance. In addition, we monitor all Internet activity. We also control access to only those areas of the web needed to complete the job tasks assigned to that work station.
All the data transferred from customers to TechSpeed servers happens in a secure manner. Customers are given individual login IDs and data is encrypted before being sent or received. A VPN connection is not required, as access is given to the customers for very restricted areas on the servers and not to the LAN.
Once TechSpeed receives data from the client, it is stored in a password protected area of the server. A project manager is assigned to manage the processing of each batch of data. He provides access to the data to the prospective project team members. Data is provided on an as-needed basis throughout the work shift on the main server. As soon as the batch of data has been completed, the original client-supplied files as well as the entered data is encrypted and stored in a password protected area. Only the project manager and management team have access to these batch files. All access to the server is monitored and activity is logged for audit purposes.
Data Archiving and destruction
Once data has been entered and gone through Quality Assurance, it will be identified as completed work. Completed work is provided to the client and then put through our archival process. Client provided data and processed data are encrypted and locked with password protection and then stored in a password protected archival area of the server. The Client will instruct TechSpeed in writing, as to the time frame (Date and time) that the data is stored in archives before it is destroyed. The project manager will have the authority to destroy the data files according to written instructions. There will be an audit of the destruction process using written requests and server logs. We make daily back-ups of all encrypted data and store it off site in a secure location.
A sufficient connection to the Internet is a critical consideration when choosing an outsourcing partner. The Internet is your communication link with your partner for sending and receiving files, online training, remote connections for direct work on your server, online chats and IP phone calls etc. If your partner does not have a sufficient connection, you are setting yourself up for failure. TechSpeed currently has 2 WAN links from two different vendors. The primary link is 2Mbps. The secondary link is 1Mbps. Both are leading ISP providers guaranteeing 99.95% up time. In the rare possibility that one ISP goes down, we can instantly switch to our secondary ISP.We handle data traffic of over 200 GB per month on these links. We can upgrade these links to cater to additional bandwidth requirements within a short span of time (typically 2 weeks). We also have the option of installing a Fiberoptic line (up to 2 Mbps) within 14 days as a third back up.
Power & Utilities
Our entire facility can be run on auxiliary power. We have multiple back-up options to enable us to run the facility without utility power for an uninterrupted and indefinite period of time. We achieve this using two redundant 125 KVA diesel generators. A single generator can supply all power to our infrastructure including HVAC systems. The second generator is the redundant back up. The electrical supply into the facility is conditioned using a three-phase servo stabilizer. All power supply to computers is provided by online redundant Uninterrupted Power Supply systems. We have four UPS systems suppling servers and workstations including the following sizes: 10 KVA, 7.5 KVA, 3 KVA, 5 KVA Load balancing and redundant clusters stabilize voltage and frequency to within 1%. A water storage tank on the roof of our building has the capacity to service the entire Techspeed facility for 1 week.
Our engineers and IT partners have helped us build a highly robust infrastructure, which is geared for the highest quality and scalability. Our desktops are typically high-end Pentium and are supported by servers with redundant power supplies and multiple processors.
We have designed our infrastructure with a UPS (Uninterrupted Power Supply) system including an automatic shutdown feature on all critical computing resources. The diesel generator backup allows us to operate on a 24/7 basis and provides us a 100% protection against any form of power disruption. We have high-speed web access provided by two separate Internet Service Providers (ISPs)
Business Continuity Plan
Techspeed has a robust and time-tested Business Continuity Plan (BCP) that ensures that the business operations of TechSpeed are not disrupted by any natural or unnatural disaster.The BCP reiterates our commitment to delivering the highest quality solutions using the onsite/offshore model, and protecting our clients from risk. Our business continuity plans are based on the need to protect professional staff, computing infrastructure, and intellectual property in order to help our customers remain in business through any contingency. That includes provisions to ensure the mobility of professional skills along with fully redundant communications backbones and computing infrastructures.