The following facts reflect Sweans BPO’s commitment towards managing information security.
- Dedicated Security Team.
- Engagement of professional consultants for information security expertise.
- Close monitoring of all the activities of data in network and associates.
- Vision of planning for ISO 27001-certified.
- Dedicated Security Team.
- Engagement of professional consultants for information security expertise.
- Close monitoring of all the activities of data in network and associates.
- Vision of planning for ISO 27001-certified .
- Security Configuration Standards – Networks, OS & Applications
The organization-wide security configuration standards are covered under the procedure / policy “Meeting Security Requirements” and “Managing Security for Technology related infrastructure.” However, due to the nature of ITES business, which is client- / process-driven, the configuration standards are further mapped to the client requirement for respective engagements. Documentation for the same is prepared and made available through the final technology document for every respective engagement.