Data Security Is Key

We understand how important it is to keep our clients' information private, considering how valuable data has become in today's world. With data being so easily accessible, there are increased risks to its security. To ensure our clients' trust and confidentiality, we follow the strictest data security and compliance standards. We adhere to the SOC 2 Type II guidelines set by the American Institute of Certified Public Accountants (AICPA). We are in progress to get ISO 27001 accreditation which is an international standard that helps organizations manage the security of their information.

Our Expertise

What is SOC 2 Type II?

SOC 2 Type II is a set of guidelines established by the American Institute of CPAs (AICPA), which outlines how data should be handled and safeguarded. It establishes criteria for managing data based on the following five principles:

  • Security

  • Availability

  • Integrity

  • Confidentiality

  • Privacy

Protocols Followed by Valdatum

  • Physical Security

    1. Our office premises are accessible only with access cards / badges issued to employees. We perform a cycle count to monitor issuance of these access cards.
    2. The premises are monitored through high-definition CCTV cameras 24*7 for safety and security.
    3. Production areas can only be accessed by staff. Any visitors are not allowed near workstations.
    3. All confidential documents are stored securely with limited access.
    4. All our hard-drives are encrypted so that data cannot be extracted just in case a team member loses a laptop.
    5. All USB drives are disabled (except to allow for mouse, monitor, keyboard, etc. usage).

  • IT Control

    1. We use Nordlayar firewall and end-point protection (anti-virus) to protect our network and endpoints. Any website, downloads, etc. that may be potentially risk are entirely off the grid.
    2. All laptops are set up to time-out after a short duration of no usage to avoid unauthorized access.
    3. Regular data backup is taken should there be a need in case of a disaster. Data backup is not done in case of using VDI (Virtual Desktop Infrastructure) environments.
    4. Client information exchange is done through channels approved and discussed (e.g., MS-Teams, a particular location on client server, client email server, etc.).

  • Technology Prowess

    We accelerate Digital Transformation through robust and purpose-built tech solutions.
    We help you design and execute a phased modernization program to deliver priority business outcomes.

    We build on strategic partnerships by co-creating with customers and partners to provide unique solutions that work in your environment.

  • Third Party Background Verification

    All of our team members go through a third-party background check prior to joining. This check entails a third-party review of their education, employment, police verification and other criminal records.