GLOBAL STANDARD

DATA SECURITY + PROJECT MANAGEMENT

We follow a comprehensive project management and data security process that is matched with global data security standards. Our project managers follow a combination of SCRUM and PRINCE2 agile project management practices along with conforming to processes to meet data security standards.

SCHEDULE A CALL TO LEARN MORE

COMPLIANCE

ROBUST PROCESSES, PRACTICES, AND STANDARDS

We conform to HIPAA guidelines, and are processing ISO 27001:2013, improving on our process-based execution and infrastructural readiness. Adopting best practices in information security, we help clients to rest in ease as we take care of their data and deliver projects with the utmost professionalism, agility, and quality possible.

IMPREGNABLE

ENVIRONMENT

We employ the global best practices in terms of maintaining a secured work environment for processing client data - especially for sensitive projects. Therefore we make use of the following technologies and processes to maximize our readiness to combat cyber threats and/or minimize internal vulnerabilities.

Disk + File Encryption

Military-grade encryption technology to preventing data leakage, enabling file-level encryption for transfer protection, and storage of user data in crypto disks.

Best-in-Class VPN

Enterprise-class VPN solution to allow best protection on using cloud-based platforms and for securing access in remote working environments.

Data Sensitivity Workflow

Employ on-site workforces with unique security clearances for sensitive projects in addition to constant monitoring of workers through robust security protocols.

Have a project that demands high-end security and delivered in a controlled environment?

TALK TO US

PROJECT

LIFE CYCLE

Adopted from the best-in-class project management methodologies practiced worldwide for annotation workflow and labeled data delivery.

RESOURCE

PROTOCOLS

Staff Confidentiality

Every member of the team involved in a specific project needs to sign a non-disclosure agreement (NDA) to maintain confidentiality before they are given access to the data they will work on and the inclusion in the annotation platform of choice.

Delivery Protocol

Project files are delivered with a 256-bit encryption, accessible through a public key. All data related to the project (except agreements and reports) are erased within ten business days after delivery wherein clients are duly notified.

Data Security Training

We provide periodic training on data security on different global data security standards such as HIPAA. These training are mandatory for new team members and refresher are organised for existing team members each month.

Data Export

It is not possible for annotators to export data on live projects or share data without being in approved roles. Once a project is over, the project manager is given the authorisation to export data for clients in their preferred formats.

PREFERRED

APP STACKS

To streamline internal and external communications, and executions, we take advantage of the following software regularly, many of which are being used for collaboration with our clients and their teams:

Let's start a project...

Together!

Acme AI brings in the best-in-class annotation, practically experienced ML engineers, and infrastructures to tend to nearly all avenues of MLOps. Begin the final trek towards creating your dream AI systems or fine-tuning your existing ML models with us!

GET STARTED