about us
Serco About us
We are committed to fostering and maintaining long term good will and trust with clients by effectively safeguarding client sensitive information and restricting the use of such data on a “Need to Know Basis only”.

Organization wide Adherence …

Serco Global Services adheres to ISO 27001, BS7779 and PCI security protocols across our centres, networks, and data centres. Along with this, data sharing protocols are complied with, restricting data visibility to authorized personnel only, which is further tracked to ensure safe disposal of data after necessitated usage. All such data transfers are logged and recorded for auditing and compliance purposes.

Training & Compliance…

Employees across delivery centres are trained on the security measures which are enforced on every individual across the organizational hierarchy. Regular update trainings and security quizzes are conducted to assess employee understanding on these measures.

Tolerance Policy…

Serco Global Services mandates security adherence at all times by all employees and has a zero percent tolerance towards any unethical practice. All such issues are dealt with in the strictest manner to ensure minimum impact to the service delivery.

Business Continuity & Disaster Recovery…

Serco Global Services follows a stringent framework and is committed to protecting our clients’ interests and business continuity during crisis situations. We follow a set of procedures defining how well we continue/recover our critical functions in the event of an unplanned disruption to the normal business process.

On an ongoing basis, an actionable Crisis Management Plan (CMP) at a corporate level is available and tested to address all business continuity needs. The plan’s integration with our Quality Management System ensures deployment across the organization and all key engagements.

Serco Global Services takes technical and organizational security measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access and against all other unlawful forms of processing.

We act as "the data importer“, that is, we are the processor receiving personal data from data exporter/controller. We process the personal data on behalf of the data exporter, in compliance with his processing instructions, which may be specific instructions or standing instructions of general appreciation.