
In order to support your business objectives with diverse capabilities, we use third-party services in the form of:
- Freelance/Consultants
- Software as a Service (SaaS)
- Advertising and analytics
- Other solution providers
We take security very seriously and proactively take reasonable steps to protect personally identifiable information (PII) of our clients and their customers. Examples:
- Unique, strong login credentials are used. Encrypted storage. Restricted access.
- 2-step verification/authentication is used wherever available.
- Encrypted connections are use whenever available.
- Information is shared only on a need-to-know basis.
- Non-disclosure policy.