At Zonka Technologies we always pay special attention to Security and Intellectual Property issues. We believe that a truly effective security system is the one that is followed by every employee and affiliate. We deeply respect our customers’ intellectual property rights and business data and take comprehensive measures to safeguard them. A whole range of security procedures and policies are implemented at different levels.
Intellectual Property Protection
We initiate an NDA singing before business sensitive information exchange with each client to provide the maximal level of information security and confidentiality.
Each employee is required to sign a Proprietary Information Agreement as well as an individual NDA at the moment they join the company. .
The disclosure of proprietary information directly or indirectly to a person not involved in the project along with usage, copying, publishing, summarizing and/or moving this information out of the company’s premises is strictly prohibited.
The employees are not allowed to participate in any other business during their employment and are not allowed to use any of their knowledge in the way that may lead to unfair competition upon termination of their employment.
Project-based IP Segregation
The usage of dedicated resources for each project allows prevention of unauthorized access to the client’s proprietary information. .
Strong ethical framework existing inside the company ensures that no information is exchanged between projects.
Every project team can be segregated into a separate secure physical location and can work within a dedicated LAN segment.
Each employee is provided with a photo ID-badge and an access card with easy-to-identify bands.
Access restrictions are applied to every employee providing entrance rights only to specific areas.
A 24x7 security monitoring and surveillance system are installed.
Fire protection is organized according to the regulations and requirements, all the necessary facilities can be easily accessed in case of fire alarm.
The whole territory of the office is a non-smoking area.
Unauthorized access to the network resources is prevented via Security Firewalls.
Authorized access to PCs and workstations is organized using Group Policies.
Only authorized personnel has the permission to access important files and directories.
E-mail and web-servers reside on an independent data center.
Established Backup and Recovery Policy. Backups are performed on a monthly and daily basis. Monthly backups are stored in a secure location and the backup logs are properly maintained.
The established system of multi-level security management presupposes regular external security audits which enable to reveal the existing and possible security weaknesses.
No removable media (including CDs, flash memory storage devices etc.) may go in and out of the facility without the written permission from the administration.
The access to the VPN/VLAN/VNC is restricted to the authorized personnel only.
Workstations and servers are SPAM- and virus-protected in real-time mode.
Important infrastructure elements can be quickly replaced in case of malfunction to minimize system downtime.
Wireless LAN in the office is built using the security-enabled technology