Security

Security

Our goal is to protect the entire business ecosystem: clients, customers, and employees.

Security and data privacy are essential parts of our culture. A single contact carries lots of information between your company and your customers.

For many years, our clients have trusted Teleperformance as experts in security. To protect our clients’ security, we constantly adapt to technology, monitor risks and threats, and comply with international regulations on data privacy.

Developing a holistic approach

We operate in every major business vertical in every region of the world. This allows us unique insights into the realm of data security and data privacy.

As experts in Data Security, we have a holistic approach in identifying and mitigating risks, with a strong people-focused foundation. Our security professionals include Certified Information Systems Security Professional (CISSP), Certified Fraud Examiner (CFE), Certified Information Systems Auditor (CISA), ISO Certified Lead Auditors, and Project Management Professional (PMP) Managers.

Curve

Teleperformance is a member of the following data security organizations:

Text Image
Text Image

Recent awards for security practices:

Text image 2
Text image 2
ImageAndListText

Using Compliance, Privacy and Security Best Practices to improve business efficiencies.

As experts in Data Security, we comply with security standards and regulations including General Data Protection Regulation (GDPR), Global Essential Compliance and Security Policies (GECSP).

 

Compliance and Standards

  • Information Security Management System ISO27001 certified operations
  • Supplemented by Contractual compliances like PCI-DSS, HIPAA / HITRUST, SSAE16/18
  • Adherence to local Regulations
  • Data Protection Regulation – GDPR
  • NIST based Cyber Security framework
  • OWASP Standards for Application Security
  • ISO22301 compliant Business Continuity Practices
  • ISO20000 IT Service management certified
Policies and Procedures

Proprietary Global Essential Compliance and Security Policies (GECSP) for staff and 3rd party vendors to combat possible fraud & security violations by: 

  • Alerting managers to inappropriate access
  • Ensuring paperless operations, frisking staff, hardened workstations & awareness training
  • Vulnerability Management Program
  • Centralized Security Operations center for Incident Management reporting and tracking
  • Managing and monitoring end-to-end compliance from uploading evidence required by GECSP through reports delivered to senior management

In this digital age, it has never been so important to have a safe and seamless omnichannel customer experience.

Let’s Talk

In this digital age, it has never been so important to have a safe and seamless omnichannel customer experience.

Let’s Talk
Resource center