SecurePRO™ Card of Félix Lembo Stache
Procedures and policies
SecurePRO™
Program
Program
Identity information (Know Your Translator™)
ProZ.com history
Registered | Apr 2018 |
Paying member | MAY 2019 |
Has visited ProZ.com in the last 31 days. |
Identity
/
Know Your Translator™ data
Security procedures
Standard security procedures
- Safeguarding of content: I take care to prevent confidential project files and content from being accessed by unauthorized parties.
- No discussion: I do not discuss confidential project content with unauthorized parties.
- No paper copies: I either do not create paper copies, or am willing to agree to shred them upon project completion.
- Password-protected folders: I understand how to, and am willing to agree to, password-protect file folders.
- Dedicated project folder: I am willing to agree to keep separate file folders for separate clients.
- No cloud storage: I am willing to agree to store content only locally on my own machine(s), i.e., not in "the cloud".
- No unauthorized sampling: I use samples from completed translations (in portfolios, or otherwise to market my services) only with client permission.
- Confidential collaboration: I do not disclose confidential information when obtaining assistance from fellow translators on term selection, etc.
- Home office: I have an office in my home.
- Dedicated space: My home office is in its own room.
- Private space: I am the only one who uses my home office.
- No public spaces: I work exclusively, or almost exclusively, from home.
- On-site audit: I am willing to agree to make my home office available for on-site audit.
- Locked computer: My work computer is password protected.
- Sole user: I am the only person who uses my computer.
- Antivirus: My computer has up-to-date, licensed antivirus software.
- File scanning: All incoming/outgoing files are scanned for viruses and malware.
- Software updates: I have a tool that checks for updates to all of the software on my computer.
- Private screen: My computer's screen is not visible through a window.
- Locked phone: My mobile phone is protected by password, fingerprint or facial recognition.
- Password-protected network: My home office's network is password protected.
- Firewall: My home office's network is protected by a firewall.
- No outside wifi: I do not use, or am willing to agree not to complete a project using, wifi outside of my home office.
- Offline work: I am willing to work from home, offline only, if required.
- Conflict of interest: If I experience a conflict of interest, or recognize the possibility of that perception, I will immediately discuss that with my client.
- No privileged actions: It is my policy not to take any actions (ex. buying stock) as a result of having gained access to confidential information.
- Illegal activities: If I became aware of any illegal activity, it is my policy to immediately report that to the relevant authorities, and to my client if appropriate.
- Disclosure reporting: If confidential information were ever inadvertently disclosed, I would notify my client immediately.
- No subcontracting: I do not subcontract/outsource work, or I do not do so without client permission.
- Background check: I am willing to submit to personal background checks.