Data Security Policy of BURG Translations

BURG Translations Data Security Policy

At BURG Translations, we prioritize the security and confidentiality of our clients’ information. Our robust Information Security Management System (ISMS) is designed to protect your data and ensure the highest standards of information security. This commitment is formalized through our ISO/IEC 27001:2022 certification, demonstrating our adherence to internationally recognized security practices.

ISO/IEC 27001:2022 certification badge for BURG TranslationsWe handle various types of sensitive information including Protected Health Information (PHI) under HIPAA, educational records under FERPA, and other Personally Identifiable Information (PII) requiring specialized security controls and compliance measures.

Our Security Framework

Information Security Management System (ISMS)

Our comprehensive ISMS provides the foundation for our security practices, ensuring:

  • Confidentiality: Information is accessible only to authorized individuals
  • Integrity: Information is altered only by authorized individuals in permitted ways
  • Availability: Information is accessible to authorized individuals when needed

ISO/IEC 27001:2022 Certification

Our commitment to security excellence is validated through our ISO/IEC 27001:2022 certification, which covers our core operational processes. This certification:

  • Demonstrates our adherence to international security standards
  • Validates our systematic approach to managing sensitive information
  • Provides assurance of our ongoing commitment to security best practices

To view our ISO 27001:2022 certificate, please contact: security@burgtranslations.com

Data Security Practices

Data Transfer

We implement stringent measures to secure data during transfer:

  • Protected Health Information (PHI): Transmitted exclusively through secure, encrypted channels using SSL, in compliance with HIPAA requirements
  • Educational Records: Transferred using FERPA-compliant secure channels with appropriate institutional authorizations
  • General PII and Sensitive Documents: Encrypted transmission for all legal, government, immigration, and business documents
  • Encrypted email communications for sensitive information via Microsoft’s access rights management
  • HIPAA-compliant Webform for secure collection of client-submitted PHI
  • Secure file transfers via OneDrive, SharePoint, or client-provided SFTP servers
  • Omission of sensitive information from email subject lines and body content

Data Storage

Our secure storage solutions ensure data remains protected:

  • Multi-layered Security: AES-256 encryption for all stored sensitive information including PHI, educational records, and general PII
  • Access Controls: Strict role-based access controls limiting information access to authorized personnel based on data type and client requirements
  • FERPA Compliance: Educational records stored with additional protections meeting FERPA requirements and institutional security standards
  • HIPAA Compliance: PHI stored in dedicated secure environments meeting all HIPAA technical safeguards
  • Multi-factor authentication and strong password requirements for all system access
  • Regular data backups and Data Loss Prevention (DLP) policies
  • Segregated storage environments for different data classification levels

Data Destruction

We maintain secure destruction processes for data that is no longer required:

  • HIPAA Compliance: Permanent destruction of PHI using secure methods to prevent unauthorized access, following HIPAA-compliant retention policies
  • FERPA Compliance: Educational records destroyed according to FERPA requirements and institutional record retention policies
  • General PII: Secure destruction of all personally identifiable information following industry best practices
  • Physical document shredding and secure digital file erasure in compliance with NIST and DOD standards
  • Detailed record maintenance documenting date and method of disposal for all data types
  • Certificate of destruction provided when required by client contracts or regulatory requirements

Data Security Governance

Risk Management

Our approach to security risk management includes:

  • Regular risk assessments to identify potential vulnerabilities
  • Implementation of appropriate controls to mitigate identified risks
  • Ongoing monitoring and improvement of security measures
  • Compliance with legal, regulatory, and contractual requirements

Incident Management

We have established procedures for managing security incidents:

  • Clear reporting channels for security incidents or weaknesses
  • Prompt investigation and resolution of reported incidents
  • Documentation and review of incidents to prevent recurrence
  • Regular testing of incident response procedures

Policy Compliance

We ensure adherence to our security policies through:

  • Regular security awareness training for all team members
  • Periodic audits and assessments of policy compliance
  • Clear consequences for policy violations, up to and including termination
  • Support for implementation and continual improvement of security measures

Data Security Objectives

We have established measurable objectives to continuously improve our security posture:

  • Reducing security incidents through proactive risk management
  • Enhancing team members’ security awareness through regular training
  • Ensuring reliability of services with an annual 99% uptime target
  • Leveraging our ISO/IEC 27001:2022 certification for growth and enhanced security posture