Quality Assurance and Confidentiality
At Transferendum, we have a duty and responsibility to protect the confidentiality of your content and activities. Our processes are integrated securely and privately so that your data is handled confidentially in accordance with GDPR and ISO 27001 data security processes. We have developed and deployed secure workflows to handle confidentiality data transmission to translators and reviewers including client review steps.
In addition, we also provide tailored confidentiality agreements to suit the needs of your specific industry. Importantly, we only work with experienced, qualified translators. We operate a Translation Management System that is fully certified with EN 17100:2015 alongside a comprehensive Quality Management System that is fully ISO 9001:2015 compliant.
Quality assured and secure processes
We have systems and resources in place to ensure effective ongoing compliance with all security requirements. This includes robust avoidance, mitigation and contingency strategies to identify any potential security risks. Our website is secure for the reception of documents to be translated and the post-translation transmission of completed documents in Portable Document Format (PDF) and Microsoft Office (DOCX, XLSX) or Rich Text Format (RTF) formats.
Any material submitted by electronic means is stored securely behind an adequate firewall with anti-virus and malware protection. Material is only accepted and transmitted electronically using secure internet protocols, such as FTPS, HTTPS, or equivalent.
All translation requests are managed with Taberna™, which is hosted on the Digital Ocean cloud platform with a proven secure network infrastructure from one of the world’s biggest cloud providers, providing 24/7 availability in fault tolerance and redundancy. Transferendum is critically aware of the importance of security matters concerning all aspects of the company and we rigorously enforce the company procedures in this regard. In relation to data, all internal employees follow all company policies and operate on secure IT systems.
Curious to learn more about our certification?
Transferendum security systems
All interactions with the systems are carried out over a Secure Internet connection. Via internal network or secure VPN or strictly over our internal network, secured behind our firewalls and infrastructure with limited access. External connections via RDP or other authenticated methods of communication.
Users of the system must register for access to the system and be approved prior to being able to access the system. Once approved, users are only given the authorization necessary to complete the tasks associated with their role and have no access to information above the scope of their role.
This applies to internal systems as well as any portal or email system or archiving structure.
All client information and server data is continuously backed up in an automated, reliable and secure fashion.
Compliance with the requirements of the Data Protection Acts. The IT infrastructure of Transferendum is designed to effectively handle, archive, store and retrieve large volumes of data on any platform, on a continuous basis.
- File signatures for all documents are always checked and scanned before uploading and accepting. We can also accept any document type via secure FTP on our servers, customer servers or integrate a system of both. All documents received this way are subject to the same scanning procedures.
- All email communication is secured in the latest exchange system and is only accessible to designated users with authenticated user names and passwords and onto designated internal devices. Secure email transmission is provided to all email accounts using Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encryption.
- Additional methods of secure email transmission can be accommodated according to specific requirements of framework clients. Other forms of SMTP communication are disabled on our servers and email exchange via browser is not permitted due to the “logjam MITM (man in the middle)” vulnerability.
- Emails are scanned for malware, scripts and viruses on receipt and transmission and on local computers. File signatures for attachments are validated to match their correct file types. ZIP and other compressed files can also be encrypted prior to transmission or receipt.
Explore our Solutions
Solving your linguistic challenges efficiently
Your Language Department il tuo partner linguistico teu departamento de línguas Do Roinn Teangacha votre bureau de langues Ihre Abteilung für Sprachen
Translation is not a “one size fits all” solution. That’s why our mission is to tailor bespoke translation and localisation solutions to meet your individual needs, budget, and timeline! Get started today!