
We comply with the global standards of information security and data protection

We are fully compliant with the General Data Protection Regulation (GDPR), the European Union’s benchmark legislation for data privacy and protection. This compliance ensures that we uphold the highest standards in handling personal data—covering data collection, processing, storage, and disposal. Our practices are designed to safeguard individual privacy rights, maintain transparency, and ensure accountability across all our operations involving EU data subjects.

We are an ISO 27701 certified. The ISO 27701 is the international standard for privacy Information management system. It is a privacy extension of ISO 27001. This is an internationally recognised framework that helps organizations show accountability while managing risks around personally identifiable information.

We are an ISO 27001:2022 certified company. The ISO 27001:2022 is the international standard for ISMS – Information Security Management System. This certification ensures that we meet the required standards for information security policies, physical security, environmental security, asset management, compliances and a host of other standards that we use to establish, implement, maintain and continually improve the information security management system.

We are an ISO 9001:2015 certified company. The ISO 9001:2015 is the international standard for quality management system. This certification ensures that we meet the required standards for customer focus, leadership, people engagement, process driven approach, process improvement, evidence-based decision making and relationship management in all our core functions.
We adhere to some of the most rigorous infrastructure procedures to ensure utmost security

Fixed office and workstation for every employee

Designation-based employee access to each office floor

24/7 surveillance by CCTV cameras

No cell phones allowed on the floor

Necessary fire safety equipment in place


SSL VPN for employees who work from home
Firewall with content and website filters
Password protected systems
Group email ID by client
Folder access rights to client specific teams
Secure internet browser through anti-virus & firewall
Whitelist domain – only authorized person can send email(s)
No USB access or cell phone access
No access to office Wi-Fi on private cell phone

Access to client’s server in secured environment through VPN / secured RDP / Citrix
Access to client’s data only to the users working on client’s account
User rights are defined based on their designation
Password protected accounting system
Role-based accounting system rights
Access to dedicated group e-mail ID, fax number or secured FTP to share documents

Strong password protocol through combination of capitals, lower-case letters, numbers and special character
Network protection via stringent firewall configuration that filters incoming and outgoing internet traffic
Anti-virus and anti-malware enabled company data protection. It neutralizes viruses, adware, worms, trojans and so on
All computers are regularly patched and updated by a central server
Disk level data encryption and password restricted user access in all company devices
Rigorous implementation of pre-scheduled data backup sessions
Regular employee trainings to increase data security awareness
PGS Security Program
(Policies and Procedures)
This policy specifies the constraints and practices that an employee must agree in order to use organizational IT assets and access the PGS network or the internet. It is a standard onboarding policy for new employees.
This policy defines employee access with regards to PGS data and information systems. It includes access control standards and implementation guides. The policy has standards for user access, network access controls, operating system software controls and complexity of passwords.
The policy refers to the formal process to make changes in IT, software development and security services/operations.
The information security policy covers a large number of security controls. It pushes employees to be accountable and follow the rules with regards to sensitive information and IT assets.
This policy outlines an organized approach towards incident management and offers remedies for the operations.
This policy documents and defines acceptable methods of remotely connecting to PGS internal networks.
The email communication policy documents the employee usage of various electronic communication mediums defined by PGS.
This policy talks about the disaster recovery plan as part of the business continuity plan. In case of a disaster, the disaster recovery policy is initiated.
The BCP policy describes the operation of PGS in an emergency situation.
Seeking personalized support?
Request a call from our expert team