SECURITY
At Supalogix, security is our top priority—whether it concerns our customers’ data or our own team members’ information. We tailor our security measures to each client, implementing customized technical and organizational controls for every project. Below, we outline the data protection steps taken by our Corporate Security and Technology Departments.
ADMINISTRATIVE/MANAGEMENT SECURITY
LOGICAL SECURITY
Intrusion detection and prevention system. These monitor our corporate networks for malicious activity or unauthorized access and take actions to prevent it.
PHYSICAL SECURITY
CCTV and security Cameras – we use CCTV in the event of an incident, monitor the perimeter of our offices and prevent future incidents that can ward off potential external and interal threats. We have structured our company premises into designated security zones, each with specific access controls and safeguards to ensure the protection of all facilities. All Supalogix information is processed exclusively within these specially secured areas. Access to high-value, highly sensitive, or critical assets follows a strict hierarchical zoning system and operates on a least-privilege basis. Only Supalogix team members are permitted entry to our premises, with all external access strictly restricted. Entry is managed through biometric scanning on specialized devices, and every team member is issued a personal badge for visual identification within Supalogix premises.
RISK COMPLIANCE
1. Data Security & Privacy Compliance
Adherence to data protection laws such as GDPR, CCPA, HIPAA, PCI DSS (depending on industry and location).
Encryption and secure storage of customer data to prevent breaches.
Restricted access to sensitive information based on role-based permissions.
2. Call Monitoring & Recording Compliance
Ensuring compliance with laws that regulate call recording (e.g., obtaining customer consent).
Secure storage and limited access to recorded calls to protect privacy.
Regular audits of call logs to prevent misuse or breaches.
3. Identity & Access Management
Implementation of multi-factor authentication (MFA) for accessing call center systems.
Strict role-based access control (RBAC) to limit exposure to sensitive data.
Regular employee access reviews and deactivation of former employees’ credentials.
4. Fraud Prevention & Detection
Real-time fraud monitoring tools to detect suspicious activities.
Implementation of Know Your Customer (KYC) verification processes.
Employee training on recognizing and reporting fraudulent activities.
5. Regulatory & Legal Compliance
Adhering to telemarketing laws such as TCPA (Telephone Consumer Protection Act) and Do Not Call (DNC) regulations.
Ensuring fair debt collection practices if applicable (FDCPA – Fair Debt Collection Practices Act).
Compliance with industry-specific regulations (e.g., HIPAA for healthcare-related call centers).
6. Business Continuity & Disaster Recovery
Backup and disaster recovery plans to ensure service continuity in case of cyberattacks or natural disasters.
Redundant data storage and failover systems to minimize downtime.
Regular testing and updating of disaster recovery procedures.
7. Employee Security Training & Compliance Awareness
Regular security awareness programs to educate staff on phishing, social engineering, and data protection.
Compliance training tailored to industry regulations and company policies.
Continuous monitoring and assessment to ensure adherence to compliance protocols.
In alignment with the international ISO/IEC 27001:2013 standard, we continuously enhance our security framework to ensure compliance and system integrity. To successfully pass audits and maintain the highest level of security, we regularly update our security policies, conduct company-wide security training, and implement advanced incident monitoring systems. This proactive approach allows us not only to meet ISO/IEC 27001:2013 requirements but also to deliver the most secure services possible.
PCI-DSS Certification
Along with ISO/IEC compliance, our company also adheres to the international PCI DSS standard. Since our support teams handle sensitive customer data, we implement the highest security measures to prevent data leaks or corruption. To maintain our commitment to security, we undergo third-party audits and complete the PCI DSS assessment, confirming our status as a PCI DSS Level 1 Service Provider.