Page 21 - Xperien ESG Report 2022
P. 21

Privacy
                  & Security Systems

                  Across is a list of ways we provide
                  security systems for data carrying
                  devices that are in our custody.

                  In addition, we also provide the
                  following controls:



                  Access Control
                  All critical security points have
                  biometric access controls,
                  which are time stamped.

                  Camera Surveillance System Tagging
                  In order to remain complaint with PoPIA
                  and GDPR. Our facilities, and trucks are
                  fitted with security cameras. To protect our
                  customer’s privacy, video evidence of the
                  Hard Drive Destruction is sent to the client.
                  Static Guards
                  Xperien utilises the services of a security
                  company to gaurd its premises 24/7/365.
                  Ensuring the physical safety of assets.

                  Physical Destruction
                  For maximum security, the shredding of
                  data bearing devices (i.e. hardrives)
                  ensures that the data is unrecoverable.

                  Vetting of Employees
                  Security Background Checks are
                  conducted for all staff handling data
                  bearing devices. Only a limited number of
                  technicians are allowed in our DestroyData
                  Lab, and in our DestroyData Truck.

                  Secure Chain of Custody & Vehicle
                  Tracking
                  We have executive control of all logistics
                  enabling us to monitor our fleet’s
                  movement through tracking software.

                  Control over the chain of custody of the
                  data is important to ensure the hard
                  drives, and devices remain secure
                  throught he process up to the
                  point of data destruction;
                  before asset disposal.
   16   17   18   19   20   21   22   23   24   25   26