Equipped with an environment capable of restoring and managing versions, backing up
data,
databases and running programs everyday. Set up security in the programming environment
and train staff on security.
Develop and apply the company's security regulations according to ISMS standards
Perform security checks on new employees (signing a commitment, strictly complying with regulations)
Conduct security checks twice a year for all employees
Because the security policy of each project is different, it is necessary to disseminate that policy to members before starting
Apply fingerprint biometric identification for each employee when entering the office
Enfore both computer password lock and screen lock
Store documents in lockers
Store personal belongings, laptops in locked cabinets (when leaving, employees must first clean their desk)
Applying the technology office model throughout the company
Prohibit the use of information storage devices such as USB
Control the transmission to the servers with MAC addresses, control the settings of each section of the project
Set up available rooms, prepare dedicated servers and Internet lines to meet customers' security requirements
Can use Chatwork, Zoom, Skype Business, email
The exchange of data will be based on the customer's request