We take the security of your data seriously


Confidentiality and data security have been infused into quickskill’s service platform since the company’s founding in 2009. We have developed a comprehensive security infrastructure to ensure that client information is held in strict confidence, supported by stringent protocols and practices.

When developing and documenting client processes, we work closely with each account to jointly determine which data and systems will be handled by the Quickskill team.

Quickskill ’s data security infrastructure segments physical, electronic, and human security to provide a comprehensive set of safeguards for client data. This process has been developed in conjunction with industry experts and is continuously reviewed and refined.


How we maintain our data security infrastructure


Our human security systems include:

  • Background Checks: Quickskill conducts criminal, credit, and employment background checks on all employees. 
  • Security Policy: Quickskill ‘s security policy (available upon request) includes process guidelines, ethical (“Chinese”) walls, and a process for escalating any security issues immediately. Quickskill reviews any incident immediately and this policy overall on a quarterly basis. 
  • Confidentiality Agreements: Each employee executes nondisclosure agreements directly with Quickskill .  
  • Management: Quickskill managers are trained to monitor / coach teammates on proper security procedures. 
  • Ongoing Training: Quickskill ensures each employee is sensitized to client security needs and trained in how to meet those needs.

Our information security systems include:

  • Endpoint Management: Devices connected to Quickskill  and client networks are kept up to date with security software and hardware. 
  • Single Sign On: Session and end user authentication. 
  • Password Management: Quickskill has a secure password management infrastructure that secures all logins. 
  • Server Security: Quickskill ‘s servers are based in a secure US data center with complete backups. 
  • Desktop Monitoring: Quickskill uses screen recording software and auditing procedures to allow our managers to review that security policies are being adhered to. 
  • IP Restrictions: Quickskill leverages IP login restrictions to limit access to known IP addresses. 

Our physical security systems include:

  • Security Cards: Our team has key secure key cards / ID cards to access the buildings
  • Security Guards/Alarms: All international locations have security alarms and guards appropriate to their environments. 
  • Video Monitoring: Video monitoring is in place to provide an additional layer of security. 
  • Biometrics: To verify employee identities. 
Note:  Due to Covid-19, some employees are working from their homes instead of our physical offices

Experience quickskill