S E R V I S P I R

Security

Data Security and Confidentiality at ServiSpir

We understand that when a firm uses accounting, bookkeeping, payroll, or tax services, a lot of sensitive data must be exchanged. Client data security and confidentiality are highly important to us.

Work Station & Network Security

We implement strong workstation and network security measures, including:

  • Microsoft Server Architecture for system management
  • Restricted access to authorized personnel only
  • Fortigate Firewall and high-level antivirus protection
  • No removable storage devices allowed on workstations
  • Paperless environment to enhance security and sustainability
  • Prohibition of unauthorized email and cloud storage systems
  • Restricted access to personal email and limited website access
  • Workstation trackers that capture screenshots every 15 minutes
  • Static IP-based data transfer through SSL-protected FTP servers located in the US

Data Security

Our firm complies with all GDPR requirements and uses sophisticated software, hardware, and dedicated servers to ensure complete financial data security. Our measures include:

  • ISO 9001 and ISO 27001 certifications for Information Security Management
  • Dedicated VPS servers for secured data transfer
  • Robust data security policies ensuring maximum protection

Physical Security

Our workplace maintains strong physical security standards, including:

  • 24/7 CCTV surveillance throughout the facility
  • Access control system at the entrance regulating entry
  • Password-protected server room accessible only to IT staff with access cards
  • No CD R/W drives or active USB ports on workstations
  • Document storage areas are well-secured
  • Security guards monitor the premises constantly

Employee Credibility

We take employee credibility seriously to maintain trust and confidentiality:

  • Employees undergo rigorous background checks during recruitment
  • All employees sign non-disclosure and non-compete agreements
  • All client data (electronic or physical) is destroyed after project completion
  • Only selected personnel have access to sensitive information
  • Continuous employee monitoring through workstation trackers
WhatsApp
email
Go To Top