Data Security Policy of BURG Translations
BURG Translations Data Security Policy
At BURG Translations, we prioritize the security and confidentiality of our clients’ information. Our robust Information Security Management System (ISMS) is designed to protect your data and ensure the highest standards of information security. This commitment is formalized through our ISO/IEC 27001:2022 certification, demonstrating our adherence to internationally recognized security practices.
We handle various types of sensitive information including Protected Health Information (PHI) under HIPAA, educational records under FERPA, and other Personally Identifiable Information (PII) requiring specialized security controls and compliance measures.
Our Security Framework
Information Security Management System (ISMS)
Our comprehensive ISMS provides the foundation for our security practices, ensuring:
- Confidentiality: Information is accessible only to authorized individuals
- Integrity: Information is altered only by authorized individuals in permitted ways
- Availability: Information is accessible to authorized individuals when needed
ISO/IEC 27001:2022 Certification
Our commitment to security excellence is validated through our ISO/IEC 27001:2022 certification, which covers our core operational processes. This certification:
- Demonstrates our adherence to international security standards
- Validates our systematic approach to managing sensitive information
- Provides assurance of our ongoing commitment to security best practices
To view our ISO 27001:2022 certificate, please contact: security@burgtranslations.com
Data Security Practices
Data Transfer
We implement stringent measures to secure data during transfer:
- Protected Health Information (PHI): Transmitted exclusively through secure, encrypted channels using SSL, in compliance with HIPAA requirements
- Educational Records: Transferred using FERPA-compliant secure channels with appropriate institutional authorizations
- General PII and Sensitive Documents: Encrypted transmission for all legal, government, immigration, and business documents
- Encrypted email communications for sensitive information via Microsoft’s access rights management
- HIPAA-compliant Webform for secure collection of client-submitted PHI
- Secure file transfers via OneDrive, SharePoint, or client-provided SFTP servers
- Omission of sensitive information from email subject lines and body content
Data Storage
Our secure storage solutions ensure data remains protected:
- Multi-layered Security: AES-256 encryption for all stored sensitive information including PHI, educational records, and general PII
- Access Controls: Strict role-based access controls limiting information access to authorized personnel based on data type and client requirements
- FERPA Compliance: Educational records stored with additional protections meeting FERPA requirements and institutional security standards
- HIPAA Compliance: PHI stored in dedicated secure environments meeting all HIPAA technical safeguards
- Multi-factor authentication and strong password requirements for all system access
- Regular data backups and Data Loss Prevention (DLP) policies
- Segregated storage environments for different data classification levels
Data Destruction
We maintain secure destruction processes for data that is no longer required:
- HIPAA Compliance: Permanent destruction of PHI using secure methods to prevent unauthorized access, following HIPAA-compliant retention policies
- FERPA Compliance: Educational records destroyed according to FERPA requirements and institutional record retention policies
- General PII: Secure destruction of all personally identifiable information following industry best practices
- Physical document shredding and secure digital file erasure in compliance with NIST and DOD standards
- Detailed record maintenance documenting date and method of disposal for all data types
- Certificate of destruction provided when required by client contracts or regulatory requirements
Data Security Governance
Risk Management
Our approach to security risk management includes:
- Regular risk assessments to identify potential vulnerabilities
- Implementation of appropriate controls to mitigate identified risks
- Ongoing monitoring and improvement of security measures
- Compliance with legal, regulatory, and contractual requirements
Incident Management
We have established procedures for managing security incidents:
- Clear reporting channels for security incidents or weaknesses
- Prompt investigation and resolution of reported incidents
- Documentation and review of incidents to prevent recurrence
- Regular testing of incident response procedures
Policy Compliance
We ensure adherence to our security policies through:
- Regular security awareness training for all team members
- Periodic audits and assessments of policy compliance
- Clear consequences for policy violations, up to and including termination
- Support for implementation and continual improvement of security measures
Data Security Objectives
We have established measurable objectives to continuously improve our security posture:
- Reducing security incidents through proactive risk management
- Enhancing team members’ security awareness through regular training
- Ensuring reliability of services with an annual 99% uptime target
- Leveraging our ISO/IEC 27001:2022 certification for growth and enhanced security posture
