HAVE ANY QUESTIONS? CLICK HERE
Mon - Sat: 9:00 - 18:00
Remote Support: 24/7
+256 788 705511
Mobile
services@tegacc.tech
Email

Information Security Policy

Introduction

At Tega Computer Consults Ltd, we prioritize the security of our clients' data. Our Information Security Policy outlines the steps we take to secure data during all phases of our service offerings. This policy governs the protection of information from unauthorized access, alteration, disclosure, or destruction.

Scope of Services

We specialize in software diagnostics, repair, and network support services. Our services, including system performance optimization, virus and malware removal, data recovery, and network setup, all rely on safeguarding your data. Whether managing operating systems, installing software, or troubleshooting network issues, we ensure that all data remains protected in accordance with this policy.

Information Security Objectives

Our goal is to maintain confidentiality, integrity, and availability of client data by implementing the following information security practices:

  • Encryption of sensitive data both at rest and in transit.
  • Implementation of secure network protocols for safe data exchanges.
  • Access control mechanisms to restrict unauthorized personnel from accessing client data.
  • Regular audits of our systems and processes to identify and mitigate security vulnerabilities.
  • Comprehensive disaster recovery and data backup solutions.
  • Real-time threat detection and response to prevent potential security breaches.
Data Access Control

Access to client data is granted on a need-to-know basis only. We ensure that only authorized employees or partners are given access to sensitive information, and their access is regularly reviewed and updated. We also train all employees in information security best practices.

Incident Management

In the event of a data breach or security incident, we have a dedicated incident response team that follows a defined protocol to minimize the impact. This includes immediate containment, investigation, and communication to affected clients as required.

Third-Party Providers

We work with trusted third-party providers for certain services (e.g., cloud hosting or software solutions). All such providers are vetted for their adherence to information security standards. Contracts with third-party vendors include clauses to protect client data and ensure compliance with security policies.

Security Testing and Audits

We regularly conduct penetration testing, vulnerability scanning, and security audits to ensure that our systems and networks remain secure. These audits are done by both internal teams and external security experts to identify and fix potential weaknesses.

Client Responsibilities

Clients must ensure that their systems, including devices used for accessing our services, are also protected against threats. This includes using strong passwords, installing security patches, and employing basic cybersecurity best practices like virus protection and firewalls.

Data Retention and Disposal

We retain client data for the duration of our services, after which data is securely deleted or anonymized. If required by law, data may be retained for longer periods, but once it is no longer necessary, we ensure its secure destruction.

Client Rights

Clients have the right to request access to, correction of, or deletion of their personal data. Our clients also have the right to request a copy of our security practices and audits.

Contact Information

For any questions or concerns regarding our InfoSec Policy, Please CONTACT US

tega_11zon-3.png
We deliver cutting-edge digital solutions to support and accelerate the growth of your business, ensuring success in today’s dynamic IT landscape.
Plot 1249, Kirinya, Bweyogerere
+256 200 905511
services@tegacc.tech

Search