Worried about service charges ?

Get all your annotation requirements done for just $3.5/hr.
Try our free demo services Now

Try Our Free Demo Now!

iso27001 Infolks Image annotation EUGDPR Infolks Image annotation

Data Security


We respect data security the most and ensure that your information gets the same respect.

Data Security

We respect data security the most and ensure that your information gets the same respect.

How we assure?

How we assure?

Level 1

Certifications

We are ISO 27001:2013 certified and our environment is compatible with EU GDPR standards.

Level 2

In-house Employees

All our services are done by hired in-house employees at our secure work spaces. Services are neither crowdsourced nor outsourced to third parties.

Level 2

Legal NDA’s

We make our in-house employees to sign a legally valid NDA so as to ensure secure handling of your data.

Level 1

Network Security

We have implemented high standard firewall systems on our networks so as to prevent any form of cyber threats and attacks. Internal data transfer are also carried out through highly secured LAN networks.

Level 2

Environmental Access

With a biometric office entry-exit systems, we ensure that only authorized persons enter the office environments.

Level 1

Surveillance

We have setup a 24/7 recording surveillance system for constant monitoring over workspace.

Level 2

Restrictions

Mobile phones or any other type of electronic and data storage devices are completely restricted in office premises.

Level 1

Data Storage

Data that we receive are downloaded and stored in highly secured computers to which only authorized personnel has access. Once the project is over, the same data are retained for another 14 days for any post project needs. After which the data is completely removed from systems.

Level 2

Data Handling

Project data are received from clients through secured cloud storage. The shared data are then stored in a well protected master computer. These data are then passed to annotators using highly secured LAN networks. No external devices like hard disks, pen drives, etc. are used for internal data transfer. The labeled data is then collected from employees using LAN networks and stored in the master computer. Labeled data are submitted back to clients using secured cloud storage.

Level 2

Dedicated Team

A set of data security officials along with qualified lead are summoned to form a Data Security Wing for implementing accurate data security measures

Website Privacy Policy

We respect and value your privacy