Data Security and Confidentiality

Home Data Security and Confidentiality

AUSIS

Data Security

Our facilities adhere to global security, health, and safety standards. In addition, we have the ability to scale up rapidly depending on project requirements. Our secure delivery centre is equipped with the latest technology, infrastructure, and dedicated technical staff to ensure our working environment has complete reliability and security for our clients’ data.


  • Global Standards Compliance: Our facilities meet and exceed international standards for security, health, and safety, ensuring a safe and compliant working environment.
  • Scalability: We can quickly and efficiently increase our capacity to meet the demands of any project, providing flexible and scalable solutions.
  • State-of-the-Art Technology: Our secure delivery centre utilizes the latest technological advancements to maintain high performance and reliability.
  • Dedicated Technical Staff: Our team of highly skilled professionals is committed to maintaining the highest levels of security and reliability, safeguarding our clients' data at all times.
  • Dedicated Technical Staff: This comprehensive approach guarantees that our clients' information is protected with the utmost care and diligence.

Security Certifications And Practices

We are an ISO 27001 certified and GDPR certified company. This means our offices and systems adhere to international best practices for information security management. Befree employs both physical and non-physical controls to ensure the integrity and security of our company and client data.

  • ISO 27001 Certification: Our certification in ISO 27001 demonstrates our commitment to maintaining a robust information security management system (ISMS), ensuring that we follow rigorous processes to protect sensitive information.
  • GDPR Compliance: As a GDPR certified company, we adhere to the strict data protection regulations set forth by the General Data Protection Regulation, ensuring the privacy and security of personal data.
  • Comprehensive Security Controls: We implement a range of physical and non-physical controls to safeguard data, including secure access protocols, encryption, and regular security audits.
  • Trained Staff: Our back-office staff in India are extensively trained on security protocols. We conduct continuous educational sessions to stay updated on industry-specific threats and best practices.
  • No Third-Party Contractors: All work is performed by our in-house team, ensuring that sensitive information is handled exclusively by our trained and trusted employees.

On-Site Security Control

  • Entry Controls: Biometric scanners and access cards required.
  • Authorized Access: Only authorized personnel allowed in office and processing center.
  • Prohibited Items: No physical documents, books, or other devices in the processing center.
  • CCTV Monitoring: Entire office under surveillance.
  • Dumb Terminals: PCs are desktops with no local data storage capability.
  • No Printers/Scanners: Printers and scanners not available in the processing center.
  • Locker Use: Staff must store personal belongings, including bags, books, and mobile devices, in lockers outside the processing center.
  • Data Storage Disabled: Saving and storing data on PCs is disabled.
  • External Drive Access Disabled: No access to physical/removable drives.

Cybersecurity Control

  • Controlled Internet Access: Only whitelisted websites accessible.
  • Restricted Email Access: No access to personal emails; work emails cannot send data outside.
  • IP Authentication: Intranet and internal software accessible only from office premises.
  • Password Security: Strong, regularly updated passwords required for internal software.
  • Monitoring: Screen snapshots and regular audits to ensure compliance with security guidelines.
  • Security Software: Terminals and servers equipped with firewalls, antivirus, intrusion detection/prevention systems, and kept updated.
  • Auto-Lock Feature: PCs auto-lock to prevent unauthorized access.
  • No Wireless Connections: Wireless connections prohibited in the back-office in India.

Staff Training And Development

  • Confidentiality Agreement: Staff must sign an agreement regarding security protocols for data, client information, and business insights.
  • Breach Reporting: Immediate reporting of any breaches required for prompt action.
  • Information Sharing: Prohibition on sharing information outside the organization; internal sharing restricted to work-related purposes only.
  • Data Security Training: Mandatory attendance and satisfactory completion of regular data security training sessions.