Data Security Protocols to Safeguard Your Information

Global Companies Trust Us with Their Data.
Because We Make Every Effort to Protect It.

Outsourcing Made Safe With
No Data Hassle to Tackle

We protect your data through its entire lifecycle, regardless of whether it is
at rest or at work, with a stringent 3-layer data security framework.

VE's IT Support engineers also have the necessary arsenal to configure the security settings of your web server or reset its settings should your site be the victim of a hacking attack.

Security Practices
& Procedures

Further, Virtual Employee Pvt. Ltd. has in place detailed information security practices, procedures and programs as also a distinct IT Security Policy apart from a dedicated Cyber Security Policy which is aimed at protection and preservation of cyber security and information security of client information resident on, or accessible, using the computer resources belonging to the company.

Employee
Sensitization

Our company also regularly trains its staff, by having regular sessions on IT security and the law protecting our clients’ data at regular intervals. These sessions also sensitize the consequences that can befall upon deviant employees, in case they mishandle, deal or access client-related information in an unauthorized manner.

Consequently, we also sensitize them that they are mandated to comply with our company’s internal policies and our documentations, and that if they choose not to comply and that non-compliances comes to our attention, either by knowledge, or by conduct or by somebody else reporting it, it will take us only a couple of hours not only to take immediate action against the errant employee but also to take recourse to all the legal remedies.

Clean Desk policy: No one should keep either soft copy or hard copy in any place that is easily seen or accessible by all. This also applies to always locking the laptop screen whenever they are not in front of their laptop or desktop.

Legal sessions are taken again with the employee at the time of their exit and they are made aware of their confidentiality and privacy obligations in terms of the NDA signed by them.

Work From Home
Made Safe

VE follows a hybrid working model, with the majority of its resources working from home, pan-India. That said, even though work from home has become the new normal, we have extremely stringent measures in place to ensure the security protocols are as tight (if not tighter) as in an office environment and set up. VE employees abide by each and every rule and regulation even if they are working from a remote location. They report daily to our clients and their managers to ensure a seamless workflow.

Some of the measures in place are:

The clients can ask to block certain websites from their employee’s system.

Employees are not allowed to use any external hard disk to store the data unless approved by client or management.

Private email access can be blocked as per the client's requirement but only in office.

Usage and implementation of Firewall and policies.

All access to outside world is logged within the office premises.

Regular backups are kept in secured locations.

Clients can monitor the laptop screen regularly through any monitoring software they want and we have installed our own as well on every employee system.

Access to floppy, USB drives and CD disk drives are disabled on all desktops. Prior written permission of a Sr. Manager /Project Manager is required for usage of respective drives only as per the project’s specific requirement.

High level of anti spam, antivirus and anti-spywares ensures that the data is not hacked or leaked outside of the organization.

Virtualization

Employee can also work in a virtualized environment through virtualization technology i.e. data is not stored on employee's local machine instead it is stored on our data center. Since we foster a culture of employee responsibility through regular training, our employees understand the significance of upholding the confidentiality of information and data belonging to clients, who outsource their data and operations to our company.

Designated cabins/ rooms

We also have provisions to house a client’s team in private rooms (T&C apply).  Although, digital card readers are required for access to our offices, if a client wishes we can also add biometric finger print security for just the client’s specific room too. Additionally, we can have security guards, man the entrance to this room, if desired.

VE's IT Support Team

We have a team of very experienced and highly skilled IT Support team. Ongoing training is an integral part of VirtualEmployee’s IT Support team which keeps them updated at all times with all the latest developments in the domain of Network and System Administration. The highly experienced IT Support Head as well as the team members have a slew of prestigious IT-specific Certifications from AWS, Microsoft, Cisco and Linux.

For more information refer to our our

Fostering the Law

Penalizing Those
Who Mess with It

The Government of India takes data security very seriously. So do we. Data theft in India is punishable not only by civil litigation but also by criminal litigation through the Information Technology Act, 2000 and the Indian Penal Code.

Imprisonment for all those found guilty, with sentence ranging from 3 years to life imprisonment.

Hefty monetary fines, ranging from $1,267 to $12,677

Assured redressal for all damages by means of compensation.

Your Data Security At a Glance

IT Act, 2000

Protects you data from hacking

Computer-related offences

Identity theft & misusing data

Breach of privacy & confidentiality

Damage to computer source code

Punishment: Hefty fines + Imprisonment

VE's Legal Measures

ISO 27001:2013 Certified and adheres to the ISO standards

Strong security system at office

Employee sensitization

Legal contract with employees

Own legal team to handle all security issues

VE's IT Protocols

Virtualization

Own IT team to secure every system

Monitoring software in every system

Strong action against offenders

Cloud-based data storage system

Outsource with Confidence

Eliminate the Data Risk

As a responsible company, Virtual Employee is strictly following the ISO 27001:2013 and CMMi Level 3 guidelines and has its IT team and necessary legal protocols to safeguard your documents and data at all times.

To learn more, visit our website at