MOWEDE's Corporate Security Policy

We are fully committed to the security of our clients' intellectual property, equipment and livelihoods. We have instituted comprehensive security policies in our testing labs, including the following essential procedures:

Data Access Security

  • Data security firewalls are installed to prevent unauthorized access to the network.
  • Strong password policies are in place for limiting access to PCs and workstations to authorized users.
  • Access to important files and directories is granted only to specific personnel.
  • All mail and web servers are located at an independent internet data center.
  • A backup policy is in place. Monthly backups are stored at an off-site location and removable backups are kept safe with logs that are duly maintained.
  • Frequent & surprise security audits are conducted to assess any potential breach with multi-level security management in control.
  • Email encryption is applied to important emails.
  • Password protection is used for important documents.

Network Security

  • Each client's process is run on a separate VLAN/VPN when run off-shore/off-site.
  • Software-defined secure tunnels are implemented through the internet.
  • Only client-authorized personnel are allowed access to the VLAN/VPN, preventing others from accessing project information.
  • Anti-virus protection is in effect for all desktops & servers.
  • Spam and attachment filters are also used.
  • Live monitoring of network activity on WAN and LAN is in effect.

Physical Security

  • Photo ID cards and access cards with easy-to-identify bands are issued to all employees of our offshore labs.
  • Visitors are provided with separate cards and are not allowed beyond specific access points within our offshore labs.
  • Restricted access for each employee is in effect for all locations.
  • Security guards are on continuous 24/7 duty.

Non-Disclosure Agreements (NDA)

  • All employees sign individual NDAs, in addition to proprietary information and inventions agreements.
  • Employees may not disclose any proprietary information directly or indirectly to anyone outside the company, or use, copy, publish, summarize or remove such information from company premises.
  • Employees may not use any unfair competitive practices upon termination of employment or engage in any outside business during employment.
  • Any confidential information received from third parties and clients is held in the strictest confidence, and used only as necessary to meet our obligations to the providing party contracting our services.
  • Any inventions and relevant records relating to or derived from work for the company, its vendors or clients must be disclosed to the company. All information and records pertaining to any ideas, processes, trademarks, service marks, inventions, technology, computer programs, original works of authorship, designs, formulas, discoveries, patents, or copyrights so conceived or developed must be promptly disclosed to the company.

Staff Allocation, Training and Culture

  • Dedicated resources are made available for all projects. This prevents unauthorized usage of client resources and protects all client proprietary information.
  • We instill in all employees, as part of our comprehensive training programs and our company culture, a strong ethical framework that forbids exchange of IP between projects.

Confidential Document Control

  • Access to public mail systems is not allowed, and access to removable media is restricted and controlled by the project manager responsible for client projects.
  • IT controls include monitoring of email messages that exceed a certain size, with or without attachments.