Misha Infotech: operates on "work for hire" basis. Misha Infotech's professionals provides technical protection of clients' assets.
Fast paced communications are very essential in offshore software outsourcing. We at Misha Infotech take all necessary steps to provide protection of e-mail systems, database servers, web servers, desktop systems and the like from viruses, Trojans, and other threats.
At Misha Infotech, the licenses of software used in our state-of-art development center at Noida are up to date. Also, if we use third party controls or code from our client's work, we ensure that code is used after proper analysis of the licensing policy, so there are no licensing issues for the client.
Misha Infotech Professionals take special care that confidentiality of clients' business data is maintained. Measures taken to maintain confidentiality are:
All our employees sign confidentiality and Non-disclosure Contracts.
- Password management, documentation management and control are used during project.
- The software developed for a client can be assessed by developers and quality assurance team only.
- System administrators are the only people who can access servers which are protected by password.
After delivering a project, we maintain offline backups and delete all information from the server. Both software and data are kept in systems with highly restricted access (However, the backup can be deleted on client's request.)
Additional Protection Measures
Apart from the above mentioned measures, we may provide additional protection measures based on client's requirements. They are:
Physically Separate Units: During the ongoing project, we provide a physically separate unit within the office with limited access to authorized professionals only. The belongings of such professionals are monitored before going in and out of the restricted area. In addition, the computers in these separate units have no media drives.
- Network Access: We provide Virtual Private Network Access to client's server. This ensures that only authorized persons can access the network and data cannot be intercepted. Also, limited internet access can be provided over 100% monitored network.