Sensitive Documents. Sensitive Data. No Problem.
How Does PaperEntry AI
Ensure Data Security?
For the past four years, Deep Cognition has achieved and exceeded the cyber security requirements and protocols of a U.S. Government contractor handling sensitive data.
- Encryption at rest
- Encryption during data transmission
- Deletion protocols for processed data
- Server firewalls, system access control measures, and vulnerability management reviews
Here is a list of Security and Trust plans and policies that we follow to ensure secure and safe use of Deep Cognition’s technology assets and data:
- Acceptable Use Policy
- Asset Management Policy
- Backup Policy
- Business Continuity Plan
- Code of Conduct
- Data Classification Policy
- Data Deletion Policy
- Data Protection Policy
- Disaster Recovery Plan
- Encryption Policy
- Incident Response Plan
- Information Security Policy
- Password Policy
- Physical Security Policy
- Privacy Policy
- Responsible Disclosure Policy
- Risk Assessment Policy
- System Access Control Policy
- Vendor Management Policy
- Vulnerability Management Policy