We have established a set of corporate policies and procedures that every employee must comply with such as account, data, and physical security, along with more specialized policies covering internal applications and systems that employees are required to follow.
We sign a non-disclosure agreement with our clients as to provide their sensitive information with maximum security and confidentiality. Upon acceptance of employment, all employees are required to execute a confidentiality agreement and must acknowledge receipt of and compliance with The DGIT’s security policies.
Our applications run in a multi-tenant, distributed environment. Rather than segregating each client’s data onto a single machine or set of machines, The DGIT proprietary and client data is distributed among a shared infrastructure comprising multiple homogeneous systems located across multiple geographically distributed data centers.
We acknowledge your expectation of full ownership and control over the Intellectual Property (IP) that your company requires to conduct its business. We have put in place a legal system which ensures that all employees, consultants and third parties sign agreements that assign all IP to The DGIT immediately on creation and waive all moral rights to the fullest extent permitted by law.
When retired from our systems, disks containing clients data are subjected to a data destruction process before leaving our premises. The disks are logically wiped by authorized individuals using a process approved by the IT security team and released to inventory for reuse and redeployment. If impossible due to hardware failure, the disks are physically destroyed by degaussing.