SSO/SAML • RBAC • SCIM
Identity federation, least-privilege roles and automated joiner/mover/leaver flows keep access scoped to need-to-know across translation projects.
Access & identity controls, encryption, data residency, DLP/redaction, incident response and audit evidence — aligned to ISO 27001 for translation/localisation programs and certified deliveries.
Identity federation, least-privilege roles and automated joiner/mover/leaver flows keep access scoped to need-to-know across translation projects.
Source files, target renditions, glossaries and logs are encrypted; keys rotate per policy.
Block common PII and mask previews/comments so reviewers see only what’s necessary.
Store data in contracted regions (e.g., 🇮🇳 India, 🇪🇺 EU); retain only as long as required.
Defined severities, P1 < 24h comms target, and root-cause with corrective actions.
Exportable access logs, version pins and acceptance matrices support audits.
access: - user: "pm-07" role: "PM" action: "read" time: "2025-10-07T10:00Z" - user: "rev-14" role: "REV" action: "write" time: "2025-10-07T10:15Z"
incident: severity: "P2" status: "contained" rca: "misconfigured sharing rule" fix: "rule tightened; tests added"
Yes — annually, with remediation tracked; summaries available under NDA.
P1 target < 24h with ongoing updates as per the IR ladder.
Yes — per contract; residency is honored for translation/localisation assets.
Yes — we map our controls to your clauses for policy alignment.
Scope, control highlights and sample logs.
Walk through access, encryption, DLP and IR.
Bind approvals to verified deliveries.