Your Privacy
Our Priority
Datawise’s Data Privacy and Security ensures adherence to the highest and most consistent standards for process quality and maturity, information security management, customer service, regulatory compliance, and business controls.
Data Security
  • All access to the application shall be restricted through user credentials and access privileges
  • Each user shall have a specified user ID and password which allows access to the system
  • Once access has been granted, the user can perform various tasks within the system
  • Each user is also attached to a specific leaf or node in the Organisation hierarchy
  • A User’s role can be designated as Administrator or
    not- Administrator
  • Administrator can perform maintenance tasks for other staff members within the organizational span-of-control of the user, whereas non-administrators can only access their own data
Data Security
  • All access to the application shall be restricted through user credentials and access privileges
  • Each user shall have a specified user ID and password which allows access to the system
  • Once access has been granted, the user can perform various tasks within the system
  • Each user is also attached to a specific leaf or node in the Organisation hierarchy
  • A User’s role can be designated as Administrator or not- Administrator
  • Administrator can perform maintenance tasks for other staff members within the organizational span-of-control of the user, whereas non-administrators can only access their own data
Information Security
  • An ISO 9001 and ISO 27001 certified company
  • Ensure adherence to the highest and most consistent standards for process quality, maturity, and Information security management
  • We comply with the EU-US Privacy Shield Framework and the Swiss-US Privacy Shield Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information transferred from the European Union and Switzerland to the United States, respectively
Information Security
  • An ISO 9001 and ISO 27001 certified company
  • Ensure adherence to the highest and most consistent standards for process quality, maturity, and Information security management
  • We comply with the EU-US Privacy Shield Framework and the Swiss-US Privacy Shield Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information transferred from the European Union and Switzerland to the United States, respectively
Operational Excellence
  • Our Business Continuity Management (BCM) discipline enables us to proactively identify and plan to minimize the impact of risks that could impact the objectives, operations, and infrastructure
  • It provides the capability to ensure continuity of the business in case there is any disruption due to unforeseen incidents
  • All of our employees are bound by the requirements of confidentiality at the time of joining the organization
Operational Excellence
  • Our Business Continuity Management (BCM) discipline enables us to proactively identify and plan to minimize the impact of risks that could impact the objectives, operations, and infrastructure
  • It provides the capability to ensure continuity of the business in case there is any disruption due to unforeseen incidents
  • All of our employees are bound by the requirements of confidentiality at the time of joining the organization
Disaster Recovery Management
  • The solution shall be hosted on a high-availability cloud infrastructure with synchronous replication
  • In addition to this, it shall be designed for backups to be taken for data on a daily basis with incremental and full backup configurations
  • Data retention policies shall be fine-tuned in collaboration with the IT and support team at the UNDP project office
  • The support team shall be fully accessible during all business hours and shall be supplemented by an emergency contact person who shall be available outside business hours
Disaster Recovery Management
  • The solution shall be hosted on a high-availability cloud infrastructure with synchronous replication
  • In addition to this, it shall be designed for backups to be taken for data on a daily basis with incremental and full backup configurations
  • Data retention policies shall be fine-tuned in collaboration with the IT and support team at the UNDP project office
  • The support team shall be fully accessible during all business hours and shall be supplemented by an emergency contact person who shall be available outside business hours
Intrusion Detection and Prevention
  • IBM® QRadar® Security Information and Event Management (SIEM) is used in the data center
  • This helps security teams accurately detect and prioritize threats across the network, and it provides intelligent insights that enable teams to respond quickly to reduce the impact of incidents
  • QRadar correlates all this different information and aggregates related events into single alerts to accelerate incident analysis and remediation
Risk and Mitigation
The key risks we plan for and provide for are
  • Scope Clarity and Scope creep risk: this is the most frequent cause of slippages in IT project execution
  • Execution risk: Detailed project plans are prepared, which identify tasks and sub-tasks, start and end dates, responsibilities, and dependencies at a highly granular level
  • Integration risk: Integration between systems poses a significant threat to the successful implementation of IT solutions
  • Quality risk: Datawise carries out intensive testing of all applications and applications components developed – from unit testing to integration testing
Intrusion Detection and Prevention
  • IBM® QRadar® Security Information and Event Management (SIEM) is used in the data center
  • This helps security teams accurately detect and prioritize threats across the network, and it provides intelligent insights that enable teams to respond quickly to reduce the impact of incidents
  • QRadar correlates all this different information and aggregates related events into single alerts to accelerate incident analysis and remediation
Risk and Mitigation
The key risks we plan for and provide for are
  • Scope Clarity and Scope creep risk: this is the most frequent cause of slippages in IT project execution
  • Execution risk: Detailed project plans are preparedt, which identify tasks and sub-tasks, start and end dates, responsibilities, and dependencies at a highly granular level
  • Integration risk: Integration between systems poses a significant threat to the successful implementation of IT solutions
  • Quality risk: Datawise carries out intensive testing of all applications and applications components developed – from unit testing to integration testing
Datawise has customers spread over 25 countries across Domains and Industry segments. We harness Insights and Intelligence to bring about Infinite Transformation. Proven Frameworks and Proprietary Tools improve Operations, Delivery Models, and Customer Experience.

Developed by Aaroh Consulting

© Copyright 2022 Datawise. All Rights Reserved.
Datawise has customers spread over 25 countries across Domains and Industry segments. We harness Insights and Intelligence to bring about Infinite Transformation. Proven Frameworks and Proprietary Tools improve Operations, Delivery Models, and Customer Experience.

Quick Links

© Copyright 2022 Datawise. All Rights Reserved.