Security and Trust
Deep Cognition and PaperEntry AI use multiple methods and layers of security to ensure full security and trust.
Our software and infrastructure are architected with the utmost in data security and system protection in mind.
Sensitive Documents. Sensitive Data. No Problem.
How Does PaperEntry AI Ensure Data Security?
For the past four years, Deep Cognition has achieved and exceeded the cyber security requirements and protocols of a U.S. Government contractor handling sensitive data.
Encryption at rest
Encryption during data transmission
Deletion protocols for processed data
Server firewalls, system access control measures, and vulnerability management reviews
Security and Trust Plans
Here is a list of Security and Trust plans and policies that we follow to ensure secure and safe use of Deep Cognition’s technology assets and data:
- Acceptable Use Policy
- Asset Management Policy
- Backup Policy
- Business Continuity Plan
- Code of Conduct
- Data Classification Policy
- Data Deletion Policy
- Data Protection Policy
- Disaster Recovery Plan
- Encryption Policy
- Incident Response Plan
- Information Security Policy
- Password Policy
- Physical Security Policy
- Privacy Policy
- Responsible Disclosure Policy
- Risk Assessment Policy
- System Access Control Policy
- Vendor Management Policy
- Vulnerability Management Policy