When it comes to information security, O2I is absolute and unflinching. We use a comprehensive set of protocols to ensure absolute security of deliverables, research materials, vendor information, and reporting outputs at each step of the research and analytic report generation process.
Each layer of our security policy addresses a specific set of variables that must be tightly controlled and constantly scrutinized for compliance. These layers can be broken down into three main security spheres that include Personnel, Hardware, and Software.
Before employment, each team member undergoes a thorough background check and performs a series of reliability tests to ensure that they are properly prepared for and able to work in a controlled and secure environment.
ID badges, individual logins, time stamps, and workstation access codes are required for each employee, and all movements and work production is tracked on a daily basis by the security compliance team. Email communications and data storage mediums are monitored on a per-use basis for consistency and proper access methodology, and all source documents delivered by the client agency are tagged and tracked by our internal document management team.
Keeping your data safe from intrusion or theft by electronic means requires both state of the art technology and an IT team capable of implementing that technology properly. Our highly trained network security staff uses a series of Cisco® Intelligent switches and Cisco® Network Assistant utilities to manage internal network structures, and we have implemented a Cisco® PIX® Firewall that features comprehensive port blocking for HTTP, FTP, TCP/IP, UDP and ICMP protocols across the entire O2I internal network.
Monitoring and managing communications security across the internal network ensures that the source information and outputs for your research and analytic project can be accessed only by those who need to see it, and our internal security procedures ensure that your data cannot leave the premises without specific permissions from the management team.
Internal E-mail communications and folder structures are encrypted and tracked, and our data backup system is wiped clean between projects, preventing the accidental transmission of sensitive information on research or analytic projects between clients.
Your security is important to us, and we have taken every possible precaution to ensure the complete and comprehensive safety of all the research and analytic project information stored on our secure servers. If you would like to know more about our security protocols before employing us on your research or analytic project, we will happily provide you with a more detailed breakdown of our internal safeguarding policies.