top of page
The Hour Logo

​Free Consultation

Free Consultation

Business Card
Light grey background with a subtle, faint grid pattern of curved and straight lines.

Data Protection & Security

Data Protection and Security Policy

At The Hour Virtual Binz INC (“we”, “our”, “us”), safeguarding customer, partner, and internal data is a top priority. We are committed to maintaining strong administrative, technical, and physical security controls to ensure confidentiality, integrity, and availability of information across all operations.

This policy outlines our approach to protecting data and securing systems in line with industry best practices.

1. Information Security Governance

The Hour Virtual Binz INC maintains a comprehensive security framework designed to:

  • Prevent unauthorized access to sensitive information

  • Protect against data loss, misuse, or alteration

  • Ensure business continuity and system availability

  • Comply with applicable data protection regulations

All employees and contractors are required to follow internal security procedures and confidentiality obligations.

2. Physical Security Controls

We have implemented multiple layers of physical security to protect office premises and infrastructure:

Access Control Systems

  • Fingerprint-authenticated entrance system ensures only authorized personnel can access office premises.

  • Biometric door lock systems restrict entry to sensitive work areas.

Surveillance and Monitoring

  • HD CCTV cameras cover both interior and exterior office areas and are monitored daily to detect unauthorized activity.

On-Site Security Enforcement

  • A professional third-party security agency conducts manual frisking of employees during entry and exit to prevent unauthorized devices from entering or leaving the premises.

3. Employee Security and Confidentiality

The Hour Virtual Binz INC enforces strict workforce security policies:

  • All employees sign Non-Disclosure Agreements (NDAs) and confidentiality agreements.

  • Background verification checks are conducted through third-party agencies before employment.

  • Regular awareness programs ensure staff understand data handling responsibilities and cybersecurity risks.

4. Network and Infrastructure Security

Domain Controller Protection

  • A centralized Windows Domain Controller (DC) manages user authentication, group policies, and secure access to shared resources.

Firewall and Perimeter Security

We utilize enterprise-grade firewall protection including:

  • Sophos XGS 2100 firewall

  • DMZ zones for isolating web servers from the internal network

  • IPsec VPN tunnels for secure client connectivity

  • Mandatory firewall authentication for internet usage

  • Intrusion Prevention System (IPS) policies

  • Web and application filtering rules

These controls protect our infrastructure from external threats and cyberattacks.

5. Endpoint Security and Data Loss Prevention

Antivirus and Endpoint Protection

  • Seqrite Endpoint Security Server is deployed across all systems for malware protection and threat monitoring

Data Loss Prevention (DLP)

Our DLP framework controls and monitors data movement through:

  • Removable storage devices

  • Network shares

  • Clipboard usage

  • Applications and online services

Real-time alerts are generated for any policy violations.

6. Data Storage and Backup Security

Network Storage (NAS)

  • RAID-5 enabled NAS servers are used to reduce data loss risks.

  • Access is restricted based on user roles and group permissions through domain authentication.

Cloud Storage Protection

The Hour.co uses secure cloud platforms including:

  • Google Drive

  • Microsoft OneDrive

  • Amazon S3 (Standard Service)

  • Zoho Workdrive

Client data stored in the cloud is encrypted and access-controlled as per contractual or regulatory requirements.

7. Removable Media and Device Restrictions

To minimize data leakage risks:

  • Use of CDs, DVDs, USB drives, and external hard drives is strictly prohibited unless formally authorized.

  • All devices entering or exiting the office are physically inspected by security personnel.

8. Web and Application Security

Our production systems and websites are protected using:

  • Secure hosting environments

  • Firewalls and DMZ network segmentation

  • Regular patching and system updates

  • Restricted administrative access

We monitor system logs and security alerts to detect suspicious activity.

9. Incident Response and Monitoring

The Hour Virtual Binz INC maintains active security monitoring and response protocols:

  • Immediate investigation of security alerts and policy violations

  • Isolation of affected systems when required

  • Corrective actions to prevent recurrence

  • Documentation and internal reporting of incidents

10. Data Privacy Commitment

We ensure that:

  • Personal and client data is processed lawfully and securely

  • Access is granted strictly on a need-to-know basis

  • Data is retained only as long as required for business or legal purposes

11. Policy Updates and Compliance

This policy is reviewed periodically to reflect:

  • Changes in regulations

  • Technology upgrades

  • Emerging security threats

Employees and stakeholders are notified of significant updates.

bottom of page