_o
INCEPTION “e®
ECHNOLOGIES INC y
Ail of inception Technologies employees are focused on maintaining the highest Jevel of physical and
digital security possible. We constantly review and test our physical security procedures and network
vulnerability to ensure that all documents and data are safe and highly secure. Below are the
processes and security controls we incorporate.
Security
uction Site Physical Securl
Our production facility is located in a modern, 6,000 square foot, fully alarmed building with 16
Camera’s providing full video coverage of the facility and your documents. Documents are secured
each night in a segregated area of our facility. All locks are coded and require a valid code to enter
into each area. Our security locks audit and tracks each entry into an area.
Inception Technologies Production Control System
The inception Technologies Production Contral System (PCS) individually tracks each box as they
move through the production process. All boxes of incoming documents or media are logged and a
label is printed to track each box as it moves through the imaging process.
Data Security
Inception Technolagies employs the following procedures for maximum security of our customers’
confidential information:
« Employment of Dual redundant RAID 5 server configuration
e File servers in production are located in a secure data center with limited access to select IT staff
only.
« All production servers and workstations are monitored and protected by our state-of-the-art
firewall and intrusion monitoring and reporting systems. In addition, all servers and workstations
are protected with antivirus software.
« Employee access to client data is tightly controlled at both the application level and fite access
level.
« Database information in process is password protected at both the Client and Server levels
Quote ARF
ARE
0013 5 v3!
T
USA
