Security at Objectways

Why Objectways?

arrow

HIPPA Certified Annotators

A SOC2 Type 2 facility

GDPR/CCPA Compliant

HIPPA Certified Annotators

A SOC2 Type 2 facility

GDPR/CCPA Compliant

Our commitment to trust

At Objectways, the security of our customers' data is a top priority. Our ever-expanding privacy and security program is rooted in the principles of Privacy by Design and informed by both industry standards and customer needs across a multitude of industries.

arrow

24 * 7 Monitoring

Physical Security Personnel at Entry and Exit gates 24 * 7 * 365 days

Metal detectors are installed to prevent workforce from carrying devices into the clean toom. Clean rooms are monitored by the supervisors all the time.

card-grid-image

Access Control

  • CCTV footage capturing is enabled at entry
    and at exit
  • Biometric Access to enter and exit the
    clean room
  • Successful and failed attempts are logged at
    badge checkpoints to enter the clean room
  • Successful and failed attempts are logged at
    biometric scans checkpoints to enter a clean room
card-grid-image

Hardening controls

  • Laptops/Workstations have strong hardening
    controls
  • Regular Malware scans are scheduled
  • Strict Quarantine policies are deployed
  • Once a critical security-patch is released,
    workstations are patched within 48 hours
card-grid-image

Background Check and NDA

  • Employees are on-boarded separately post NDA and
    thorough background checks are performed for all
    employees
  • Confidentiality Agreement is executed with all our
    clients
  • Strict Quarantine policies are deployed
  • Entire workforce is trained with HIPAA compliance
    and trained to handle Pll and PHI
card-grid-image

Employee Training

  • Regular Security Awareness training programs are
    conducted for employees
  • Regular class room sessions on security is provided as
    well as intranet sessions
  • A well-developed emergency action plan has been
    provided to employees with basic training on what to do
    in the event of a fire or Smoke alarm
card-grid-image

Security

  • Physical Security personnel at Entry and Exit
    gates
  • Metal detectors are installed to prevent workers
    from carrying devices into a clean room
  • Clean rooms with supervisors monitoring our
    workforce
card-grid-image

Data Security

  • Domain Policies are implemented to prevent our workforce
    from extracting information from their machines
  • Policies are implemented to prevent screenshot
    capture and Copy/Paste
  • Downloading and installing of Software's are
    restricted
card-grid-image

Internet and Email Security

  • Emails cannot be accessed outside of our
    network
  • Restricted Internet access to approved
    domains and sites
  • Continuous monitoring of web traffic and
    protocols
card-grid-image

Network Security

  • Dedicated Sandbox Network
  • Firewalls control incoming and outgoing traffic on
    networks, with predetermined security rules
  • Zero trust network access (ZTNA) also known as
    software-defined perimeter (SDP) solutions permits
    granular access to an organization's applications from
    users