Trusted experts in secure data annotation

The amount of data needed to train artificial intelligence is growing — and so are concerns about keeping personal and confidential information secure. At Sigma, we have the most rigorous data security and privacy procedures in the industry and treat all client data with the highest level of care and confidentiality.

Security compliance

Our commitment to maintaining accreditation with security and privacy regulations including GDPR, California’s Privacy Rights Act, SOC2 Type 2 and ISO27001 means you can be confident that your data will stay secure and compliant.

Ellipse 15
Ellipse 14
Ellipse 16

Physical security

In 2015, we opened our first secure data facility. Since then, we’ve led the industry in designing, implementing and operating secure facilities for data annotation. We also offer data annotation from our own secure facilities. Learn more about our secure facilities:

24/7 security personnel and video monitoring at entrance

2-factor authentication & metal detector at security checkpoint

No personal items allowed in, no items may be removed

Separate working areas for independent projects

Polarized screen filters on every computer monitor

Complete closure of building outside of office hours

Internal security

We make security and privacy protocols part of our culture. From the moment they’re hired, our employees must sign and follow several policies including our code of ethics, acceptable use policies and non-disclosure agreements. During onboarding, they undergo a mandatory five-step training program.

Through the use of our own proprietary annotation and communication tools, we control every aspect of how data is handled by our annotators. Email and internet is restricted. Information access is restricted or authorized based on project and job function.

Cybersecurity

To protect data from external attacks, we isolate secure computers from the outside area, disable installation of programs, and severely limit internet usage. All computer ports are blocked and printing is disabled. To assure this standard is maintained, we periodically run penetration tests and undergo external security audits.

We value your data & your trust

Data is one of your most valuable assets.Find out more about how we make data security an integral part of our day-to-day business.

ES