
Safeguarding Your Data
With the Information
Technology Act, 2000
Stay compliant with a comprehensive policy covering all regions across 190+ countries. No matter which part of this world you come from, your data is protected by us with a motto of 'protected data, secured client'.
The presence of strong legislation in India offers robust protection to all foreign companies whose sensitive and confidential data is handled by the outsourcing industry. All IT companies that work in the outsourcing industry automatically come under the purview of the IT Act, 2000 and all its ramifications.
IT Act, 2000: What It Covers
Magnifying the Fine Print
India already has very strong legal provisions that are aimed at facilitating the
growth of the Indian outsourcing industry.
Here's how
India’s Data Security
Legal Framework
Leaving No Room for Doubt
The IT Act, 2000 covers everything and anything pertaining to the use of computers, computer systems, computer networks, computer resources, communication devices, data, and information in electronic form, their activities are covered under the IT Act, 2000.
Categorizing Cybercrimes
Leaving No Loopholes Behind
The IT Act, 2000 covers everything and anything pertaining to the use of computers, computer systems, computer networks, computer resources, communication devices, data, and information in electronic form, their activities are covered under the IT Act, 2000.
So not only has this law defined various kinds of activities as cybercrimes but has also diversified them to break them down into specifics and cover the entire spectrum of cybercrimes - 1. hacking, 2. damage to computer source code, 3. computer-related offenses, 4. identity theft, 5. cheating by impersonating using computer resources, as also misusing confidential information, 6. breach of privacy, and 7. confidentiality.
Data Breach
Leaving No Room for Negotiation
With strong and stringent legal deterrents, VE ensures data security while outsourcing.
Hefty Penalty - All kinds of cybercrimes are punishable with a minimum of three years and a maximum of life imprisonment. In addition, these cybercrimes are also punishable with fines ranging from USD1200 to USD12,050.
Damages - In addition, under the Information Technology Act, 2000, a company can seek additional redress mechanisms for unlimited damages by way of compensation under Section 43 of the Information Technology Act, 2000.
So, our company can do both, charge a hefty fine or initiate appropriate legal proceedings in accordance with appropriate laws in this regards.


We are in compliance with ISO.....
As an ISO 27001-2013 certified company, we strictly adhere to the Information Security Management System requirements by embedding data security measures across our organization, further establishing our commitment and trustworthiness as conscientious guardians of our clients' confidential data.

...And we are members of NASSCOM
NASSCOM is the apex body for the $245 billion technology industry in India. NASSCOM provides advisory support to its corporate members to strengthen the cyber security and data protection culture in India. As a member organization, this helps us constructively contribute in making cyberspace safe, secure, and trusted.

Virtual Employee
Your Data Security Ally
From narrowing down client data access to a top-down data strategy – VE takes a simpler, stronger, and more straightforward approach to secure your data.
Infrastructure
Protection


CCTV: 24/7/365 monitored areas
24/7 security hotline
Biometric and Facial Recognition for access
Physical pat-downs


Privileged access management for all admin accounts
Firewall IPS/IDS for ingress/egress points
Advanced threat detection


Monitored & controlled access to services outside an organization's network perimeters
URL filtering


Private network between our offices
Wireless LAN access controls
VLAN segregation
Multi-factor authentication for security devices


Controlled and monitored physical access
Firewall used for securing the data and network environment
Information
Security Team


Dedicated information security team
Advanced security control program
Global information system policies and procedures
Information security leader and incident response team
Continued investment in enhancing cybersecurity


Customer-driven security audits
Periodic security assessments


Client-based Bespoke Security
Access controlled work space
Network-isolated server rooms
Dedicated firewalls
Tracking, or blocking of email/files
Customer-specific partitioning on some systems
End User
Protection


Quarterly account and access reviews for critical systems
Access control lists


Advanced anti-virus and malware protection
Anti-phishing
Anti-spam controls
Email security gateway


Cybersecurity awareness training
Role-based access controls
Single Sign-On with multi-factor authentication
VE makes reasonable efforts to ensure its legal measures are robust. Our legal counsel includes several highly accomplished lawyers.
1. Prevent any Data Security Breach
2. Further Amplify the Legal Deterrent

Multiple CCTV cameras installed on every floor

50+ AWS, Cisco, Linux and Microsoft Certified Engineers

Powerful anti-virus and anti-spam on all systems

On request/demand you can access employee system

You may request for certain websites and web mails to be disabled

Robust network security (NextGen firewalls installed on all employee systems)

There are also a few ways in which clients can work with their virtual employees, which makes sure that their data is secure and that they are in complete control as well. They are the following:
VE can create site to site VPN tunnel between VE & the client’s offices and their employees can log on to the systems/server in the client’s offices via remote desktop to work; all the data will be encrypted & secure. The client’s virtual employees can also use a client-based VPN via remote desktop to log into the client’s systems located in their own offices, so they wouldn't have anything stored in their local system here and they'll just be using the client’s machines in a secure way.

The client’s remote/virtual employees can also use remote productivity tools to log in to the client’ systems/server located in their office back home and work on that. That way, the employees will have no data stored here and the client also wouldn't have to share any data with them which avoids fear of any data leakage. We can also restrict the employees that they would not be able to copy any data remotely from the client’s systems there, while working on them.

VE's IT Support engineers also have the necessary arsenal to configure the security settings of your web server or reset its settings should your site be the victim of a hacking attack.
Security Practices
& Procedures
Further, Virtual Employee Pvt. Ltd. has in place detailed information security practices, procedures and programs as also a distinct IT Security Policy apart from a dedicated Cyber Security Policy which is aimed at protection and preservation of cyber security and information security of client information resident on, or accessible, using the computer resources belonging to the company.

Employee
Sensitization
Our company also regularly trains its staff, by having regular sessions on IT security and the law protecting our clients’ data at regular intervals. These sessions also sensitize the consequences that can befall upon deviant employees, in case they mishandle, deal or access client-related information in an unauthorized manner.
Consequently, we also sensitize them that they are mandated to comply with our company’s internal policies and our documentations, and that if they choose not to comply and that non-compliances comes to our attention, either by knowledge, or by conduct or by somebody else reporting it, it will take us only a couple of hours not only to take immediate action against the errant employee but also to take recourse to all the legal remedies.

Clean Desk policy: No one should keep either soft copy or hard copy in any place that is easily seen or accessible by all. This also applies to always locking the laptop screen whenever they are not in front of their laptop or desktop.
Legal sessions are taken again with the employee at the time of their exit and they are made aware of their confidentiality and privacy obligations in terms of the NDA signed by them.
Work From Home
Made Safe
VE follows a hybrid working model, with the majority of its resources working from home, pan-India. That said, even though work from home has become the new normal, we have extremely stringent measures in place to ensure the security protocols are as tight (if not tighter) as in an office environment and set up. VE employees abide by each and every rule and regulation even if they are working from a remote location. They report daily to our clients and their managers to ensure a seamless workflow.



The clients can ask to block certain websites from their employee’s system.

Employees are not allowed to use any external hard disk to store the data unless approved by client or management.

Private email access can be blocked as per the client's requirement but only in office.

Usage and implementation of Firewall and policies.

All access to outside world is logged within the office premises.

Regular backups are kept in secured locations.

Clients can monitor the laptop screen regularly through any monitoring software they want and we have installed our own as well on every employee system.

Access to floppy, USB drives and CD disk drives are disabled on all desktops. Prior written permission of a Sr. Manager /Project Manager is required for usage of respective drives only as per the project’s specific requirement.

High level of anti spam, antivirus and anti-spywares ensures that the data is not hacked or leaked outside of the organization.
Virtualization
Employee can also work in a virtualized environment through virtualization technology i.e. data is not stored on employee's local machine instead it is stored on our data center. Since we foster a culture of employee responsibility through regular training, our employees understand the significance of upholding the confidentiality of information and data belonging to clients, who outsource their data and operations to our company.

Designated cabins/ rooms
We also have provisions to house a client’s team in private rooms (T&C apply). Although, digital card readers are required for access to our offices, if a client wishes we can also add biometric finger print security for just the client’s specific room too. Additionally, we can have security guards, man the entrance to this room, if desired.

VE's IT Support Team
We have a team of very experienced and highly skilled IT Support team. Ongoing training is an integral part of VirtualEmployee’s IT Support team which keeps them updated at all times with all the latest developments in the domain of Network and System Administration. The highly experienced IT Support Head as well as the team members have a slew of prestigious IT-specific Certifications from AWS, Microsoft, Cisco and Linux.
For more information refer to our our


Fostering the Law
Penalizing Those
Who Mess with It
The Government of India takes data security very seriously. So do we. Data theft in India is punishable not only by civil litigation but also by criminal litigation through the Information Technology Act, 2000 and the Indian Penal Code.

Imprisonment for all those found guilty, with sentence ranging from 3 years to life imprisonment.

Hefty monetary fines, ranging from $1,267 to $12,677

Assured redressal for all damages by means of compensation.
Your Data Security At a Glance

Protects you data from hacking

Computer-related offences

Identity theft & misusing data

Breach of privacy & confidentiality

Damage to computer source code

Punishment: Hefty fines + Imprisonment

ISO 27001:2013 Certified and adheres to the ISO standards

Strong security system at office

Employee sensitization

Legal contract with employees

Own legal team to handle all security issues

Virtualization

Own IT team to secure every system

Monitoring software in every system

Strong action against offenders

Cloud-based data storage system