Print / Mail / Fulfillment Companies have access to information and data of clients. It is imperative that your organization secures this information and data against unauthorized access or misuse. Whether you offer services such as printing bank statements, invoices, marketing material, or you are providing data mining services for lawyers, hospitals, or government agencies, your clients want to have the peace of mind that the information provided remains secure and processed correctly.
The SAS 70 / SSAE 16 / SOC 2 audit is a great way to complete one examination and show all your current and prospective clients how secure your system and facility is.
Your clients may outsource these services for a variety of reasons. Printing equipment can be very capital-intensive, they may not have the available space to house the equipment, or they may find the security you provide far exceeds the security that can be provided in-house. Once a company determines it is necessary to outsource these services, their primary goal is to ensure the output is completed timely, accurately, and securely. In order to accomplish these goals, there are four main focuses your clients may be concerned with that are relevant to your services:
- Receipt of information or data - When they transmit information to you, the information must be secured during transmission. This can be accomplished through several methods including encryption, secured courier services, SSL certificates, SFTP sites, etc.
- Secured storage of information or data – Once the information or data is onsite at your facility, protection must be guaranteed while in your possession. Controls to ensure this protection include proper authorization of access to your employees, firewalls, DMZs (if applicable), encryption utilized for all information and data, etc.
- Processing integrity / Quality control – The processing integrity of the information while in your possession must be assured. A good quality control system should be implemented to verify all information processed was done completely, accurately, and securely.
- Deliver of finished product – Finally, the finished product must be transmitted back to the client or end user securely. Once again, utilizing various methods of encryption or data security should be implemented.
We want to be your partner. For additional information please Contact Us