SecurePRO™ Card of Miquel Gomez Besos

Procedures and policies


Created by Evelio Clavel-Rosales
SecurePRO™
Program

Identity information (Know Your Translator™)

Data that has been verified:
  • NAME
  • Phone: HOME   MOBILE
Additional data that has been provided but not verified:
  • Address
  • Citizenship: Spania

ProZ.com history

Registered May 2020
Paying member MAY 2020
Has visited ProZ.com in the last 31 days.
Identity / Know Your Translator™ data

Standard security procedures

  • Safeguarding of content: I take care to prevent confidential project files and content from being accessed by unauthorized parties.
  • No discussion: I do not discuss confidential project content with unauthorized parties.
  • File deletion: I delete project files upon completion of work, or am willing to do so upon request.
  • No paper copies: I either do not create paper copies, or am willing to agree to shred them upon project completion.
  • No cloud storage: I am willing to agree to store content only locally on my own machine(s), i.e., not in "the cloud".
  • No unauthorized sampling: I use samples from completed translations (in portfolios, or otherwise to market my services) only with client permission.
  • Confidential collaboration: I do not disclose confidential information when obtaining assistance from fellow translators on term selection, etc.
  • No term discussions: I am willing to agree not to obtain assistance from fellow translators on term selection, etc., at all.
  • No ownership claims: I am willing to agree that completed translations are the property of the client or client's client, and waive any personal rights thereof.
  • Reference material confidential: I consider reference materials to be confidential; I do not share such materials, and would not use them on other client's projects, without permission.
  • Home office: I have an office in my home.
  • Dedicated space: My home office is in its own room.
  • Private space: I am the only one who uses my home office.
  • No public spaces: I work exclusively, or almost exclusively, from home.
  • Dedicated computer: I have a dedicated computer for translation work.
  • Locked computer: My work computer is password protected.
  • Sole user: I am the only person who uses my computer.
  • OS updates: Updates to my operating system are auto-installed.
  • Software updates: I have a tool that checks for updates to all of the software on my computer.
  • Private screen: My computer's screen is not visible through a window.
  • Locked phone: My mobile phone is protected by password, fingerprint or facial recognition.
  • No pirating: I do not use pirated software.
  • Password-protected network: My home office's network is password protected.
  • Firewall: My home office's network is protected by a firewall.
  • No outside wifi: I do not use, or am willing to agree not to complete a project using, wifi outside of my home office.
  • Wired connection: My home network is wired; there is no wifi, or I am willing to agree to work only on a wired connection.
  • Offline work: I am willing to work from home, offline only, if required.
  • Password management: I have a professional approach to passwords that involves (1) strong / long passwords; (2) different passwords for different sites/services; and (3) periodic password rotation.
  • Two-step verification: I use of two-step verification procedures whenever possible.
  • Conflict of interest: If I experience a conflict of interest, or recognize the possibility of that perception, I will immediately discuss that with my client.
  • No privileged actions: It is my policy not to take any actions (ex. buying stock) as a result of having gained access to confidential information.
  • Illegal activities: If I became aware of any illegal activity, it is my policy to immediately report that to the relevant authorities, and to my client if appropriate.
  • Disclosure reporting: If confidential information were ever inadvertently disclosed, I would notify my client immediately.
  • Code of conduct: I have either endorsed the ProZ.com Professional Guidelines or am bound by the code of conduct of a recognized industry association.
  • Assumption of confidentiality: Absent agreement to the contrary, my assumption is that files and content are to remain confidential.
  • Experience with secure projects: I am experienced working with highly confidential content.
  • No subcontracting: I do not subcontract/outsource work, or I do not do so without client permission.
Client security and confidentiality are of the utmost importance to me. I do not disclose my clients’ names or their content without express written permission. I employ state-of-the-art network and data security systems and do not retain client data longer than required as per the scope of the project.
Close this window