Blog Post

Secure Legal Process Offshoring From Exigent

June 12, 2017

Exigent By EXIGENT GROUP


Your legal process offshoring is safe with Exigent stringent information security measures

8

Joy Petersen, one of the client service managers from the virtual support team explains how you need to implement high level security measures when handling client data, at all times.

We live in a dangerous viral world with hackers who can get your corporate information regardless of where it is kept – in-house or with third parties.

In light of this as a service provider, we ensure high levels of security in order to keep all data confidential and safe at all times. There are multiple layers of security measures to which we adhere to and maintain strict procedures without fail. Here are just eight of them:

  1. ISO 27001 accreditation ensures that we follow security protocols and procedures which are industry best practice for information security management.
  2. Fingerprint access: for us this means, only Exigent team members can access our offices. This is particularly important when you’re running a 24/7 business.
  3. Disabled USBs: all our PCs are set so that flash drives cannot be accessed so no information can be copied or removed from client systems.
  4. Secure paper disposal: all paperwork is stored in secure paper bins which are locked at all times. The material is shredded onsite to maintain security and confidentiality.
  5. Remote client system access: we link directly to client systems and do not store any client information on our servers.
  6. Secure-coded printing: no one can print unless their unique user code is entered at the printer. This assists us with a paper-less office approach and ensures that we only print what is needed.
  7. Confidentiality agreement: every team member signs a client-specific agreement and understands that our clients deal with highly confidential information and need us to treat it correctly.
  8. Team training: all our teams are trained to work in the same way as our clients, understanding conflicts of interest, Chinese Walls and what to do if such a situation arises.

Your business is our business and your security is of utmost importance to us as it is to you. These layers of security are continuously reviewed to reflect not only legal requirements but also new threats detection and best practices are in place 24/7.

Find out more about our services