Sensitive Documents. Sensitive Data. No Problem.
![](https://deepcognition.ai/wp-content/uploads/2024/03/padlock.png)
How Does PaperEntry AI
Ensure Data Security?
For the past four years, Deep Cognition has achieved and exceeded the cyber security requirements and protocols of a U.S. Government contractor handling sensitive data.
- Encryption at rest
- Encryption during data transmission
- Deletion protocols for processed data
- Server firewalls, system access control measures, and vulnerability management reviews
Here is a list of Security and Trust plans and policies that we follow to ensure secure and safe use of Deep Cognition’s technology assets and data:
- Acceptable Use Policy
- Asset Management Policy
- Backup Policy
- Business Continuity Plan
- Code of Conduct
- Data Classification Policy
- Data Deletion Policy
- Data Protection Policy
- Disaster Recovery Plan
- Encryption Policy
- Incident Response Plan
- Information Security Policy
- Password Policy
- Physical Security Policy
- Privacy Policy
- Responsible Disclosure Policy
- Risk Assessment Policy
- System Access Control Policy
- Vendor Management Policy
- Vulnerability Management Policy