top of page

Privacy Policy

We take every measure to ensure the confidentiality and security of your information. We have implemented industry-standard security procedures to protect your information against loss, theft, or misuse. Access to your information is strictly limited to our authorized personnel, and we will notify you in the event of any unauthorized access or disclosure of your information. If you have any questions or concerns about our Privacy Policy, please do not hesitate to contact us. Thank you for choosing Forrs Keypunching for your data entry needs.

Security & Confidentiality Security and confidentiality of data is of utmost importance and Forr's Keypunching Service, Inc. always aims for providing solutions that are compliant with laws and regulations set by various regulatory agencies in this regard. We have in place specific technical and physical security features for data system components, verification of authorized users, control-access, data integrity, and backup/recovery to ensure availability and reliability. We have 128-bit SSL encryption technology that has facilitated secure web-based data retrieval. All the access points to the records are being identified and authenticated by Username and Password. All the servers have Firewalls installed to prevent unauthorized Internet interception and have latest anti-virus software on every server to protect against Internet viruses. Other measures include restricting usage of data storage media, floppy disks, CD's , thumb drives, wireless devices, to ensure confidentiality of information. All the employees are required to sign "Confidentiality Agreement" which addresses the issue of leakage of patient or client information. Physical Security • Fully redundant and load balanced • Uninterruptible power supply (UPS) • Fully fault-tolerant and disaster-resistant• • Disaster recovery plan Secure Transmission • 128-bit SSL Encryption, if required • Firewall protected • Support for multiple authentication methods Application Security • Password authentication • Last login information • Application inactivity timers • Firewalls and anti-virus programs • No local caching of reports • 24 X 7 application availability

bottom of page