Terms of Service

Date: 13-09-2024

Version: 1.2

S. No.VersionDateDescription
11.116-Apr-2023New Policy
21.213-Sep-2024Revised Policy with various additions

Applies to: All employees, contractors, systems, and services of iSOURCe

1. Purpose

This policy defines the requirements and procedures for the use of encryption to protect sensitive and personal data handled by iSOURCe. It ensures that data collected and processed during client projects (such as lead generation and contact research) is appropriately secured in transit and at rest.

2. Scope

This policy applies to:

    All electronic data collected, processed, stored, or transmitted by iSOURCe

    All employees and tools used in data & lead generation projects

    All devices and systems (laptops, cloud platforms, email tools, etc.)

3. Encryption Requirements

a. Data in Transit

All personal and sensitive information transmitted across networks (including client data, contact lists, or project reports) must be encrypted using secure protocols, including:

  • HTTPS (TLS 1.2 or higher) for all web-based applications
  • Secure file transfers using services such as SFTP, encrypted ZIP files, or client-approved platforms (e.g., Box, OneDrive)
  • Email attachments containing personal data must be password-protected and passwords shared via a separate channel

b. Data at Rest

All stored data containing client information must be encrypted:

  • Laptops and workstations must use full-disk encryption (BitLocker for Windows, FileVault for Mac)
  • Contact databases must be stored in encrypted cloud storage (e.g., Google Drive or Microsoft OneDrive with encryption enabled)
  • USB drives or portable media are prohibited

4. Key Management

  • Encryption keys must be stored securely and only accessible to authorized personnel
  • Passwords used for encrypted files must be strong and never transmitted in the same message as the file
  • We do not manage our own encryption keys unless specifically required; we use secure services with managed key protection (e.g., Google Workspace, Microsoft 365)

5. Responsibilities

RoleResponsibility
IT/OperationsEnforce encryption on company systems and storage
EmployeesUse encrypted tools and follow secure data handling practices
Project LeadsEnsure data shared with clients complies with this policy

6. Exceptions

Exceptions to this policy must be documented and approved by senior management. No sensitive or personal data may be transmitted or stored unencrypted unless explicitly authorized under contract or law.

7. Policy Review

This policy will be reviewed annually or upon significant changes in:

  • The type of data processed
  • Client or regulatory requirements
  • Technology platforms used

8. Enforcement

Violations of this policy may result in disciplinary action, including revocation of system access or termination of contracts.

9. Contact for Questions

If you have questions or need further guidance on encryption practices:

Contact: Amit Saxena

Email: amit@isourceopportunities.com

 

is_im4“A consultative, partnership model with the inside sales function of an organization enables us to convert what often appears to be a volume of information requests into a qualified leads pipeline that become readily accepted by the Head of Sales”


-Sanjit Singh, CEO.