SECURITY AND INTELLECTUAL PROPERTY PROTECTION

At Join The Byte, we take security and intellectual property protection seriously. We are dedicated to ensuring the security of business processes from beginning to end, as well as preserving our customers' intellectual property rights and data. With this in mind, we've designed a set of corporate policies and procedures that every employee must follow, including account, data, and physical security, as well as more specific policies that employees must follow for internal applications systems.

INTELLECTUAL PROPERTY PROTECTION

We understand that the nature of the IP rights involved has a significant impact on the economic worth of the client’s software assets. With this in mind, we employ best practices as well as all legal and physical measures at our disposal to safeguard our client’s legitimate interests.

Information Non-Disclosure

We sign a non-disclosure agreement with our clients to ensure that their sensitive information is kept private and secure. All employees need to sign a confidentiality agreement and affirm receipt of and compliance with Join The Byte security policies before starting work.

Distributed Environment

Our applications operate in a distributed, multi-tenant environment. Rather than storing each customer's data on a single server or set of machines, Join The Byte distributes proprietary and customer data across a common infrastructure that consists of several homogeneous systems spread across multiple geographically scattered data centers.

Title Transfer

We understand that the client wants complete ownership and control over the intellectual property (IP) that the client’s firm needs to run its operations. We've put in place a legal structure that requires all workers, consultants, and third parties to sign agreements that immediately assign all intellectual property to Join The Byte and waive all moral rights to the utmost extent authorized by law.

Data Destruction

Before leaving our premises, drives holding customer data that have been retired from our systems are subjected to a data destruction process. Authorized individuals conceptually erase the disks using a process approved by the IT security team, after which they are released to inventory for reuse and redeployment. The disks are physically destroyed by degaussing if it is impossible due to hardware failure.

PHYSICAL SECURITY