How we work

Secure data transfer and storage




Home
Secure data transfer and storage

Secure data transfer and storage

Computyne approach to data protection and privacy is more than a legal compliance. It is a core part of both Computyne's business value proposition and its culture, as well as global in scope. Protecting your privacy is important to us and our employees. We believe confidentiality and protection of customer information to be one of our most fundamental responsibilities.
We do not use your contact information like your name and email address for personal use. We use this contact information from the registration form to send you information about our company. You can always opt-out of receiving future emails by choosing the unsubscribe option in the registration form.
Computyne believes in maintaining confidentiality of the clients and keeps their identity anonymous on the website. All the offices and production facilities of Computyne are custom-bound. Random checks are carried out to prevent any kind of violation. We value the trust entrusted upon us by our clients and see to it that all our employees bind with non-disclosure agreements. That makes us more responsible towards the client.
All the office premises and production facilities of Computyne are custom-bond. Random checks are carried out to prevent any kind of violation of guidelines.


The salient features of Computyne Security Policy include:

Strict non-disclosure and non-compete agreements bind all employees.
Entry of unauthorized persons into the premises is strictly prohibited.
Adequate security personnel are present on premises to guard the property.
Document storage area is well protected.
Entry of employees is restricted to their working area along with time restrictions and no unauthorized access is allowed in the work area.
Nothing can be taken inside and/or taken out of the premises without written permission.
Every personnel have individual password and access to their certain workstation is also restricted.
Responsibilities are strictly defined and therefore there are no overlapping areas of work.
All workstations are protected by Cyber security system to avoid any InfoSec violence over the web.



Looking for a outsourcing partner? We can help you expand your business!