
Data Protection & Security
Data Protection and Security Policy
At The Hour Virtual Binz INC (“we”, “our”, “us”), safeguarding customer, partner, and internal data is a top priority. We are committed to maintaining strong administrative, technical, and physical security controls to ensure confidentiality, integrity, and availability of information across all operations.
This policy outlines our approach to protecting data and securing systems in line with industry best practices.
1. Information Security Governance
The Hour Virtual Binz INC maintains a comprehensive security framework designed to:
-
Prevent unauthorized access to sensitive information
-
Protect against data loss, misuse, or alteration
-
Ensure business continuity and system availability
-
Comply with applicable data protection regulations
All employees and contractors are required to follow internal security procedures and confidentiality obligations.
2. Physical Security Controls
We have implemented multiple layers of physical security to protect office premises and infrastructure:
Access Control Systems
-
Fingerprint-authenticated entrance system ensures only authorized personnel can access office premises.
-
Biometric door lock systems restrict entry to sensitive work areas.
Surveillance and Monitoring
-
HD CCTV cameras cover both interior and exterior office areas and are monitored daily to detect unauthorized activity.
On-Site Security Enforcement
-
A professional third-party security agency conducts manual frisking of employees during entry and exit to prevent unauthorized devices from entering or leaving the premises.
3. Employee Security and Confidentiality
The Hour Virtual Binz INC enforces strict workforce security policies:
-
All employees sign Non-Disclosure Agreements (NDAs) and confidentiality agreements.
-
Background verification checks are conducted through third-party agencies before employment.
-
Regular awareness programs ensure staff understand data handling responsibilities and cybersecurity risks.
4. Network and Infrastructure Security
Domain Controller Protection
-
A centralized Windows Domain Controller (DC) manages user authentication, group policies, and secure access to shared resources.
Firewall and Perimeter Security
We utilize enterprise-grade firewall protection including:
-
Sophos XGS 2100 firewall
-
DMZ zones for isolating web servers from the internal network
-
IPsec VPN tunnels for secure client connectivity
-
Mandatory firewall authentication for internet usage
-
Intrusion Prevention System (IPS) policies
-
Web and application filtering rules
These controls protect our infrastructure from external threats and cyberattacks.
5. Endpoint Security and Data Loss Prevention
Antivirus and Endpoint Protection
-
Seqrite Endpoint Security Server is deployed across all systems for malware protection and threat monitoring
Data Loss Prevention (DLP)
Our DLP framework controls and monitors data movement through:
-
Removable storage devices
-
Network shares
-
Clipboard usage
-
Applications and online services
Real-time alerts are generated for any policy violations.
6. Data Storage and Backup Security
Network Storage (NAS)
-
RAID-5 enabled NAS servers are used to reduce data loss risks.
-
Access is restricted based on user roles and group permissions through domain authentication.
Cloud Storage Protection
The Hour.co uses secure cloud platforms including:
-
Google Drive
-
Microsoft OneDrive
-
Amazon S3 (Standard Service)
-
Zoho Workdrive
Client data stored in the cloud is encrypted and access-controlled as per contractual or regulatory requirements.
7. Removable Media and Device Restrictions
To minimize data leakage risks:
-
Use of CDs, DVDs, USB drives, and external hard drives is strictly prohibited unless formally authorized.
-
All devices entering or exiting the office are physically inspected by security personnel.
8. Web and Application Security
Our production systems and websites are protected using:
-
Secure hosting environments
-
Firewalls and DMZ network segmentation
-
Regular patching and system updates
-
Restricted administrative access
We monitor system logs and security alerts to detect suspicious activity.
9. Incident Response and Monitoring
The Hour Virtual Binz INC maintains active security monitoring and response protocols:
-
Immediate investigation of security alerts and policy violations
-
Isolation of affected systems when required
-
Corrective actions to prevent recurrence
-
Documentation and internal reporting of incidents
10. Data Privacy Commitment
We ensure that:
-
Personal and client data is processed lawfully and securely
-
Access is granted strictly on a need-to-know basis
-
Data is retained only as long as required for business or legal purposes
11. Policy Updates and Compliance
This policy is reviewed periodically to reflect:
-
Changes in regulations
-
Technology upgrades
-
Emerging security threats
Employees and stakeholders are notified of significant updates.

