Our Commitment to Data Privacy & Security
We understand that our customers trust us with their information, thereby Information Security & Data Privacy has always been fundamental to our business. We are committed to safeguard the personal and other confidential data pertaining to our business, clients and third parties and aim to protect it from any potential internal or external security threats or cyber-attacks.
Our various technology products and tech-based client services are supported by a well-defined and effective Information security and Data privacy management System framework to enable defense in depth. The framework encompasses policies, sub-policies, procedures, and organization wide controls targeted to ensure data is collected, processed, and shared lawfully while preserving privacy, confidentiality, integrity, and availability.
We are an ISO/IEC 27001:2013 certified organization. Having this certification to ISO/IEC 27001:2013 standards, we demonstrate:
Our Data Privacy Framework is aligned to applicable compliances such as IT Act 2000 and EU- GDPR (as a processor) and addresses requirement of most of the privacy laws across the globe.
It is led by our Chief Information Security & Data Privacy officer in cooperation with representatives from various functions at ARS including IT and Legal. Our privacy framework is well-integrated with our ISMS and some key privacy controls have been defined below along with Data Security controls.
Whether you are an employee, a client, engaged with our client or us for any business purpose, we
Our mission is to protect the confidential data (personal/non-personal) and information assets from unauthorized access, use, disclosure, modification, or destruction.
These security measures are also designed to facilitate compliance with data protection requirements, privacy by design and by default and applicable regulatory and contractual requirement.
Systems & Network Security controls are applied such as System Hardening, Patch Management, VPN Connectivity, Firewall, Intrusion Detection and Prevention System, Patch Management, End Point Protection, Anti-virus, Data Leak Prevention, VAPT of systems, servers, applications, networking devices and applications and Log Management.
Communication Security controls such as Encryption (Data at rest and transit, SSL/TLS, SSH, Message digest)
Application security practices including secure SDLC process, security scanning and IP based restriction. Other data security and access management practices are as per controls described in this section.
Access Management controls such as access role-based access, password protection, multi-factor authentication and principle of least privileges. Masking of personal data wherever not needed. Periodic and need basis access review and reconciliation.
Log Management-Logs are stored at secure place. All accesses to the applications are logged in a secure platform and/or application specific database down to the activity level.
Human Resource Security
No system can be improved unless monitored. There is ongoing monitoring for security controls to validate effectiveness and monitoring of events to respond quickly. Some of the monitoring controls include Log review of systems, servers, networking devices, applications, Internet traffic and Network analysis for any anomaly or suspicious behavior.
Dashboard for different schedules such as back-up, patch updates, VAPT, changes etc. There are regular internal audits and frequent external security audits for security & privacy. Based on the findings out of all these monitoring, audits and testing and periodic risk assessment, corrective action plans are made, and actions are taken.
For any further query, mark mail at compliance@authbridge.com
Stay Informed
Keep yourself updated with the latest innovations in BGV & Authentication Technology from India’s leading Background Verification Company
AuthBridge is the #1 Authentication Company.
Copyright 2025 AuthBridge, All Rights Reserved.
To begin, Tell us a bit about “yourself”
The most noteworthy aspects of our collaboration has been the ability to seamlessly onboard partners from all corners of India, for which our TAT has been reduced from multiple weeks to a few hours now.