ISO 27001:2013 certified

Customer Data Protection: Ownership and Privacy Assurance

Data that our customers upload to our servers remains their sole property, and it is our utmost priority to keep their data private, confidential, and secure. Content submitted to our servers, including translations of that content, will remain the customer's sole property.
Crimson Japan, will not share personally identifiable information with any third party without the customer's express consent, or unless compelled by applicable laws.

Customer Data Protection Ownership and Privacy Assurance

How we keep your
Privacy and Data Protected

Real time data deletion

Real time data deletion

Our solution offers a “Sensitive Data Management (No Data Storage)*”. This means that once text hits our server and is processed, the data is removed from the temporary storage in real time. Hence, your data isn’t retained on our servers and is immune to security threats.
This solution allows you to have complete control of your data and security. It also reduces the risk associated with data management and its control.
We do not use your data to train our machine translation engines, which is a rarity in the translation industry. This solution, we believe, is unique, extremely secure, and respects data ownership.

End to end data Encrypton

End to end data Encrypton

All communication is encrypted by default and is true for the communication between our cloud servers and the user's web browser. Through strong cryptography based on industry-tested and accepted algorithms, along with key lengths that provide a minimum of 128-bits of effective key strength and robust key-management practices, customer data is encrypted, both in transit and at rest. We hold high assurance SSL & TLS certificates – a globally accepted security certificate standard which is the highest measure to prevent threats and plagiarism.

ISMS and PCI DSS Compliant Firewall

ISMS and PCI DSS Compliant Firewall

Ulatus, a Crimson Interactive Co., has established and implemented an ISMS and PCI DSS compliant firewall and router configuration standards that do the following:

  • Restricts all traffic, inbound and outbound from “untrusted” networks (including wireless) and hosts.
  • Identifies and records all connections between our data centers and other networks (including wireless).
  • Prohibits direct public access between the Internet and any system component in Ulatus, a Crimson Interactive Co., data environment.
Regular Vulnerability Testing

Regular Vulnerability Testing

Hackers and spammers are continuously evolving new ways of entering secured systems, hence we've built our security procedures, system designs, and internal controls through a Vulnerability Management Program to identify weaknesses that could potentially be exploited to violate system security.
Our systems are protected against current and evolving malicious software threats through anti-virus software that is installed on all systems and updated regularly.

Robust Physical servers protection & Backup

Robust Physical servers protection & Backup

"Our cloud servers are hosted through high security data centers located in two different locations. The facilities are monitored with 24/7 video surveillance and motion sensor systems. Access is allowed only through an RFID access card. Only the IT-Head, IT-Infra Head, and CEO have access to the server room.
The data on servers are updated periodically, ensuring that even in drastic circumstances like natural calamities affecting one server, the other server can act as a backup.”

Data accessibility and uptime superiority

Data accessibility and uptime superiority

We've implemented redundant system's architecture that ensures your data is not just secure but also accessible with 99.8% availability. To ensure availability, all components are in a 2+redundancy model and servers are located in two geographically distant data centers. Additionally, all data is secured through near real-time incremental backups as well as daily full backups to a geographically remote location.

Regular internal training for Data Security

Regular internal training for Data Security

It is important that employees and translators are aware of the potential security threats they can encounter in their daily work routines and the security measures they need to follow to ensure a safe and effective translation ecosystem. Our employees and translators are kept up to date on matters concerning data protection through monthly refresher trainings and quizzes. Security awareness camps educating employees and translators on ISMS 27001 policies and procedures such as Good Desktop and Password Management practices are also regularly conducted.

Secure Platform for data exchange

Secure Platform for data exchange

You do not need to send files over emails, as emails are always exposed to risks! We provide clients with a highly secured quick access portal for uploading and downloading files for translation, which in turn is linked to our TMS. Translators are directed to our secured cloud based TMS, which helps prevent any data from being stored locally or on third-party devices. Data is protected by providing access only to authorized personnel as data owners who can set access rights, can revoke them at any time, and can prohibit downloads for highly confidential documents.

Translate with Confidence and Trust

Contact Us

Talk to our sales team