Pl  |  Es
 |   | 
About Us » Security policy

BackOffice Outsourcing takes care of high quality of outsourcing services. We operate on the basis of the latest IT solutions that ensure us and our Customers the highest standards of information security. 

The Security Policy implemented and carried out in Back office Outsourcing meets the requirements set out in the Data Protection Act and regulations relating to equipment and IT systems used to collect and process data. 

 

The Security Policy of BackOffice Outsourcing is carried out on the basis of:

  • contingency plans to ensure continuous and uninterrupted pursuit of business activities at the Company’s headquarters
  • contingency plans to ensure continuous and uninterrupted pursuit of business activities at Contractors’ headquarters
  • internal contingency plans in accordance with the security policy
  • employee training on data protection
  • protection of IT system resources by: firewalls and antivirus scanners, controlled access to network resources (access permissions granted by the administrator), IDs and access passwords, registering activities concerning personal data, following procedures for the destruction of data carriers
  • protection of offices through: monitoring, alarm system, limited access to offices for third parties.