Your Data Security Is Important To Us!

Internal Threats

Data loss prevention policy: BiS provides electronic paper repository which stores and retains ALL the data/documents generated for years and years of business. The repository facilitates data archival and retention while making it safely accessible to the right people anytime-anywhere. Role based access control: BiS provides a role-based access to all the users. The system admin defines the roles and can customize the users’ access to any data and their rights to read, add, delete or edit the same. Now you know your data is in safe hands!
Administration policy: For maximum safety, our password policy accepts only the strongest of passwords – alphanumeric (upper case and lower case letters) combined with special characters. If you forget your password, the system admin, when notified, can provide you with an OTP. This can be used to change the password. OR, you can tell BiS and it sends a password recovery link to your registered email address. Idle session locking and log-out policy: If you don’t use BiS for a pre-set amount of time, the system locks your application screen and later logs you off. The screen lock needs password to resume the session. Now, you can leave your desk and not be worried about peeping toms! Multiple session policy: BiS administrator can allow or ban multiple sessions for same user. This ensures one-user one-machine design is followed at all times. If a session for one user is open on a machine, the system will not permi log-in by the same user from another machine.

External Threats

Top 10 OWASP recommendations: The Open Web Application Security Project (OWASP) is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. Our development team has ensured that BiS is implemented based on the top 10 OWASP recommendations to ensure maximum security of the system.

SSL certification: SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a browser. All you need to do is to procure the certificate! Third party security testing: BiS and its individual modules are tested for security by third party security agencies including ethical hackers in its testing phase. This ensures maximum protection from phishing, hacking and eavesdropping.Type your paragraph here.