Confidentiality

Our Measures

" We at RIS, understands and respect the confidentiality issues of our clients' intellectual information. We take stringent measures to keep your data and intellectual property restricted to our trusted and authorized developers and management." " We at RIS, understands and respect the confidentiality issues of our clients' intellectual information. We take stringent measures to keep your data and intellectual property restricted to our trusted and authorized developers and management."

Project Confidentiality

The confidentiality of your project is of utmost importance to us. At RIS, we take adequate measures (in terms of physical security, data security, etc.) to provide a secured development environment. We consider project & data confidentiality as a critical element for maintaining a long-term relationship with our clients. We are committed to protect the client IP throughout the project execution cycle.
Among the specific steps taken by us as an offshore software development company are:
Signing of NDA with potential customers
Secured computer network and monitored internet usage
Each employee, upon being hired, undergoes an introductory course on IP rights and signs NDA which includes IP rights protection

Data Confidentiality

All employees are required to sign a proprietary information and inventions agreement. Individual NDAs are also signed with every employee on joining.
Employees cannot disclose any proprietary information directly or indirectly to anyone outside the project team or company, or use, copy, publish, summarize or remove such information from the company premises.
Any confidential information received from third parties and clients are held in strictest confidence and employees are not allowed to disclose or use it.

Data/Network Security

  • Firewalls are installed on our servers to ensure that access is restricted to users within the development center.
  • Users are authenticated before being given access.
  • Regular virus scans are performed to detect and eliminate virus threats.
  • Regular software updates and security patches, offered by the software vendors, are installed.
  • Detailed log files are maintained which enable effective monitoring and tracking of usage.
  • Access to public email systems is disallowed and floppy and CD disk drives/writers are disabled on all desktops. Prior written permission of the Project Manager is required for usage of respective drives.
  • Audits are being done on developer's machine to ensure the security level
  • Multiple storage media (such as drives, back-up servers, etc.) are used to back-up data. Backups are taken at regular intervals to ensure that the latest data is always available.
logo