At Tega Computer Consults Ltd, we prioritize the security of our clients' data. Our Information Security Policy outlines the steps we take to secure data during all phases of our service offerings. This policy governs the protection of information from unauthorized access, alteration, disclosure, or destruction.
We specialize in software diagnostics, repair, and network support services. Our services, including system performance optimization, virus and malware removal, data recovery, and network setup, all rely on safeguarding your data. Whether managing operating systems, installing software, or troubleshooting network issues, we ensure that all data remains protected in accordance with this policy.
Our goal is to maintain confidentiality, integrity, and availability of client data by implementing the following information security practices:
Access to client data is granted on a need-to-know basis only. We ensure that only authorized employees or partners are given access to sensitive information, and their access is regularly reviewed and updated. We also train all employees in information security best practices.
In the event of a data breach or security incident, we have a dedicated incident response team that follows a defined protocol to minimize the impact. This includes immediate containment, investigation, and communication to affected clients as required.
We work with trusted third-party providers for certain services (e.g., cloud hosting or software solutions). All such providers are vetted for their adherence to information security standards. Contracts with third-party vendors include clauses to protect client data and ensure compliance with security policies.
We regularly conduct penetration testing, vulnerability scanning, and security audits to ensure that our systems and networks remain secure. These audits are done by both internal teams and external security experts to identify and fix potential weaknesses.
Clients must ensure that their systems, including devices used for accessing our services, are also protected against threats. This includes using strong passwords, installing security patches, and employing basic cybersecurity best practices like virus protection and firewalls.
We retain client data for the duration of our services, after which data is securely deleted or anonymized. If required by law, data may be retained for longer periods, but once it is no longer necessary, we ensure its secure destruction.
Clients have the right to request access to, correction of, or deletion of their personal data. Our clients also have the right to request a copy of our security practices and audits.
For any questions or concerns regarding our InfoSec Policy, Please CONTACT US