SECURITY & PRIVACY
SECURITY & PRIVACY
Trusted experts in secure data annotation
The amount of data needed to train artificial intelligence is growing — and so are concerns about keeping personal and confidential information secure. At Sigma, we have the most rigorous data security and privacy procedures in the industry and treat all client data with the highest level of care and confidentiality.
Security compliance
Our commitment to maintaining accreditation with security and privacy regulations including GDPR, California’s Privacy Rights Act, SOC2 Type 2 and ISO27001 means you can be confident that your data will stay secure and compliant.
Physical security
In 2015, we opened our first secure data facility. Since then, we’ve led the industry in designing, implementing and operating secure facilities for data annotation. We also offer data annotation from our own secure facilities.
- 24/7 security personnel and video monitoring at entrance
- Two-factor authentication and metal detector at security checkpoint
- No personal items allowed in, no items may be removed
- Separate working areas for independent projects
- Polarized screen filters on every computer monitor
- Complete closure of building outside of office hours
Internal security
We make security and privacy protocols part of our culture. From the moment they’re hired, our employees must sign and follow several policies including our code of ethics, acceptable use policies and non-disclosure agreements. During onboarding, they undergo a mandatory five-step training program that takes place within the secure zone.
Through the use of our own proprietary annotation and communication tools, we control every aspect of how data is handled by our annotators. Email is restricted and chat is limited to our proprietary chat tool. Information access is restricted or authorized based on project and job function.
Cybersecurity
To protect data from external attacks, we isolate secure computers from the outside area, disable installation of programs, and severely limit internet usage. All computer ports are blocked and printing is disabled. To assure this standard is maintained, we periodically run penetration tests and undergo external security audits.
Let’s work together to build smarter AI
Whether you need help sourcing and annotating training data at scale, or you need a full-fledged annotation strategy to serve your AI training needs, we can help. Get in touch for more information or to set up your proof-of-concept.