Home Services About Us Partners News Get Started Now! Login to your account now, or sign up for a new account.
  SECURITY POLICY - OVERVIEW
TeamScreen's Security Policy operates at three levels: 1) Physical security; 2) Operational security; and, 3) Systems security. TSS recognizes the highly sensitive nature of the information being handled through its systems as well as by its personnel on a daily basis. Thus, the controls and procedures that TSS has implemented help to assure the security of that information as well as the physical systems underlying its operations. Each of the three levels is intertwined with the others to assure a comprehensive approach to the overall security of TSS.


PHYSICAL SECURITY
TSS's physical security begins with the physical premise in which it offices as well as the Network Center hosting its network equipment. The building is monitored 24/7 and has restricted cardkey access during non-business hours. Once inside the main building doors, the office is protected by a separate cardkey system with intrusion monitoring and web camera monitoring. Finally, the Network Center has restricted cardkey access that requires a separate permission level than the main office area.

Within the office area, all sensitive files are maintained within locked file storage. Office computers do not store sensitive material on local hard drives to prevent possible unauthorized access. Any paper item slated for disposal is shredded prior to disposal.
TOP


OPERATIONAL SECURITY
TSS's operational security begins with proper training for personnel regarding the handling, processing, storage and disposal of confidential search information. Security awareness is reflected in the handling of all client information and search submissions and results.

Each client has separate electronic and physical file structures to ensure separation of information. Only individuals directly involved in providing TSS client services view search requests and results. Physical files are maintained in locked file storage when not being processed. Obsolete paper files are destroyed via shredding prior to disposal. Electronic files are stored within the system database indefinitely for subsequent retrieval and compliance purposes.

Facsimile communications are handled in a secure location with restricted access. All received facsimile communications are initially received on a facsimile server to ensure privacy. Authorized personnel retrieve the facsimile transmissions from the server for processing.

Workstations operate Microsoft Windows XP that allows for security control of the local unit. All workstations are locked upon a preset inactivity time-out to ensure the prevention of unauthorized viewing of search requests and results.
TOP


SYSTEMS SECURITY
TSS systems security is integrated into the software at the base level. Authorization categories are established for all users with permission levels set based on individual access criteria. The system Username and Password protection is supplemented with control logs and transaction logs that record activity within the system.

All search transactions, both submissions and retrievals, occur via a secure Internet connection that is protected by Secure Socket Layer 128-bit encryption for privacy. E-mail communications can also be secured with encrypted transmission and digital signatures to ensure tamper-resistant communications.

All system network servers are located within a secure physical environment and further protected with login security for administrative access. Back-up/disaster recovery files are maintained on high capacity magnetic tape and CD ROM systems that are rotated off-site to a secure location that is monitored for intrusion detection and fire safety.
TOP


 
 
Contact Us. Resources Privacy and Security Statement Sitemap