The Security Policy of Sweans BPO ensures that all Information Security Management requirements are noticed and are performing well.
We manage sensitive and vital corporate customer information securely in addition to ensuring its confidentiality, integrity and availability.

Information Security measures employed by Sweans

The following facts reflect Sweans BPO’s commitment towards managing information security.

  • Dedicated Security Team.
  • Engagement of professional consultants for information security expertise.
  • Close monitoring of all the activities of data in network and associates.
  • Vision of planning for ISO 27001-certified.
Our policy covers the following security controls
  • Dedicated Security Team.
  • Engagement of professional consultants for information security expertise.
  • Close monitoring of all the activities of data in network and associates.
  • Vision of planning for ISO 27001-certified .
  • Security Configuration Standards – Networks, OS & Applications

 

The organization-wide security configuration standards are covered under the procedure / policy “Meeting Security Requirements” and “Managing Security for Technology related infrastructure.” However, due to the nature of ITES business, which is client- / process-driven, the configuration standards are further mapped to the client requirement for respective engagements. Documentation for the same is prepared and made available through the final technology document for every respective engagement.

SALIENT FEATURES

  • Network / System Level Security User authentication by means of a User ID and Password- Password policy enforces user to change password regularly and maintains password history. Service-specific access to infrastructure and applications. Logical isolation of network based on engagement requirements.
  • Firewall Checkpoint- Firewall protecting entire network Firewall filters all incoming and outgoing traffic.
  • Encryption- Encryption at link level is done based on the engagement requirements. Sweans BPO can support all standard encryption algorithms.
  • Servers – All physical security controls apply Bio-metric access to data centre combined with card access under camera surveillance at entry / exit door. Limited and controlled access to servers as per Sweans BPO’s “Need to have & Need to know” approach logically separated from corporate LAN Access logs enabled for audit trails Backups as per business requirements.

PHYSICAL SECURITY

  • Access Cards- Our BPO’s delivery area has an additional security measure with swipe card-based access-controlled entry for associates. This ensures unauthorized people have no access to the delivery area. Highly secured and confidential areas in Sweans BPO are further protected with a combination of access cards plus biometric devices.
  • Building Security Systems- Our office in Kinfra Park is under tight security round-the-clock. Access to the building is restricted to authorized associates. All physical entry and exit points are protected by efficient security personals. The presence of security personnel is mandated at the campus entry / exit points (controlled by the Kinfra Management) as well as at the Sweans BPO (controlled by Sweans BPO’s management).
  • Associate Level- Restricted and need-based access based on the roles are reviewed periodically. Above all, the attitude of the people we recruit is tested through Psychometric tests. Confidentiality contracts and non-disclosure agreements are signed with each associate and background checks are done. Strict norms for information storage and disposal of data – both electronic and physical – are mandatory.

HIPAA

  • All employees sign confidentiality agreements
  • Access to software via password control
  • Network protected by hardware firewall
  • HIPAA awareness programs run on the floor