
Security and Confidentiality
Your translation data is safe with us – and we can prove it.
Intertranslations’ policy and practice regarding data and document translation security is unrivaled as we are experienced and certified in storing and managing sensitive information while protecting it from unauthorised use.
Security and Confidentiality
Security of Translations
At Intertranslations, we take your data security seriously. Here’s how we protect your sensitive information:
ISO 27001:2022 Certified Security. Intertranslations is certified for information security management, ensuring your data is handled with the highest industry standards.
Advanced Protection Systems
Ironclad Confidentiality
25+ Years of Trusted Service
Our security systems have been thoroughly audited by multinational corporations, making us a trusted partner for organisations requiring the highest level of confidentiality in their translation projects.
Perfect for:
IT Infrastructure and Equipment
The design of our IT infrastructure integrates the latest technologies ensuring 99.95% system availability, enhanced security, advanced manageability, Disaster Recovery and Business Continuity operations.
The IT Infrastructure design consists of:
In-house staff work from the company network using Terminal and Citrix technologies on Azure. External staff connect to work remotely in a fully restricted and controlled Citrix on Microsoft Azure Cloud environment, for enhanced security and High Availability 24×7 service. In order to prevent any data leaks, Citrix & Group Policy rules among other restrict access to email providers sites (e.g. Gmail), Cloud Storage sites (e.g. Dropbox), and social media sites (e.g. Facebook), while drag&drop and copy/paste functions from within Citrix desktop to end-user machines is also disabled. All sessions are recorded for quality and support purposes.
The technology used allows our staff to work together in an “in-house” environment, and adoption of this technology improves productivity and the collaboration between external and internal staff. Additional security methods to prevent any data leaks from internal users include use of Trent Micro DLP suite on the local physical machines (to lock USB and media drives), and Trend Micro Full Disk Encryption to safeguard Hard Disk Drives (SSDs) from unauthorized data access in case of steal.
Freelancer vs Intertranslations inlancer®
“In-house linguists” is becoming more and more an outdated concept in the translation business. In order to provide top quality translation services in a globalized market, Intertranslations works with translators who are native in the target language of the requested translation; these people usually live in and work from literally every corner of the earth. The translation of a document from English into Swedish, for instance, will be allocated to a native Swedish speaker, who most probably – even though not necessarily – lives in Sweden.
The need to work with numerous people from all over the world, confidentiality restrictions and data protection considerations have resulted in Intertranslations:
Intertranslations has set up a virtual, controlled IT environment based on Citrix™ technologies to which inlancers® connect via encrypted SSL connections. This allows our IT Department to centrally manage applications and computing resources in a secure data center. The Citrix applications “live” in this data center, not on the endpoints (the computer of an inlancer®), and the IT Department can protect them more efficiently. Therefore, no data is at risk when a device is lost or stolen. The translators access the files for translation and other project-related material via corporate user accounts, provided by the IT department. For this, they use a Citrix software component that allows remote devices to connect to desktop virtualisation services. While on this environment, translators cannot upload from, download, or copy files to their computer, have no internet access or access to any of their own personal email accounts. Citrix ensures that project files do not leave the virtual premises of the company and that no data is lost or stolen. This technology also allows both internal and external staff to work remotely together in a safe in-house environment, facilitating teamwork and ensuring best end-results.
Intertranslations has a large network of more than 3,500 inlancers all over the world who have been recruited, tested and approved through rigorous recruitment procedures. Their performance is also monitored and recorded by evaluating every translation task they are allocated.
Help Desk Support
Helpdesk support is available 24/7 to both internal staff and freelancers.
Back-up Methods and Tools Used
Intertranslations applies the following backup schedule:
Daily backups start late night to morning hours schedule plans to keep overall network traffic low. Retention policies: 10-days for Daily Backups, 2-weeks for Weekly Backups, 1-month for Monthly Backups.
The IT security tools used in Intertranslations are the following:
Data Loss Prevention Methods
Intertranslations has the following measures in place, in order to prevent data loss,:
Information Management, Data Protection, GDPR
The Information Security Management System (ISMS) in place, which was only recently updated and successfully audited by an accredited organisation, fully complies with the provisions of the EU General Data Protection Regulation (GDPR) regarding the management of personal data. The ISMS, in full compliance with GDPR:
When new linguists are recruited, and their personal data recorded, Intertranslations informs them that their personal data will only be used for the purpose it was requested for, that it shall not be shared with any third party without their written permission and that it will be securely stored in state-of-the-art IT systems. Linguists are asked to confirm their agreement.
Business Continuity
The company possesses a 24/7 system for error monitoring and disaster recovery process as well as in-house and remote back-up files.
Intertranslations has put in place a detailed Business Continuity and Disaster Recovery Plan. The DRP examines fifteen (15) different disaster scenarios (e.g. server failure, mail server failure, domain controller failure, systems failure, fire/earthquake/loss of building, etc.) and details the required actions, the people responsible and the estimated time-frames when these actions must be concluded.
In case of mail server failure for instance, the company has spare servers in store which can be used, while maintenance work takes place on the failed server. The estimated time to use the spare server is three (3) hours, while the time to get back in business on the normal mail server is one (1) working day.
State-of-the-art IT infrastructure that includes:
Penetration Tests
External & internal penetration tests are performed yearly from dedicated Security Companies to ensure the security and efficiency of our systems and services.