IT and Confidentiality

Technical security of confidentiality

  • Two copies of each our document are saved on a current basis.  Moreover an additional copy of all of our digital resources is made on a daily basis.
  • As a rule, we do not send each other any attached documents, and this makes it extremely difficult to access by unauthorized persons. Instead, we notify each other of the location of a given document in the server.
  • Our e-mail box may only be accessed after providing a password and is exclusively available in our internal server.
  • Upon our Clients’ request their documents e-mailed to them may be compressed and secured with passwords provided in person or by phone. Upon our Clients’ request we are also ready to encrypt their e-mails.
  • Passwords to our computers are changed on a regular basis.
  • The IT system is protected by commercial anti-virus software.