Title Image

Security Statement

Our Company is guided by the basic core values, code of conduct and business ethics which shape and influence the way Private Eyes operates. These core values include professionalism, respect for employees, stakeholders and customers and a permanent concern for health, safety, and the protection of the environment.

It is our commitment to ensure the security and privacy of our client’s data; to ensure against any foreseen dangers or risks to the security or respectability of such records and data; and to secure against unauthorized access to our utilization of such records or data which could result in substantial harm or inconvenience to our customers.

We maintain physical, electronic, and procedural safeguards that comply with federal standards to maintain the confidentiality of your information. We also regularly assess new technology and developments in this area and upgrade these safeguards as appropriate.

Private Eyes maintains a written Information Security policy that defines employee’s responsibilities and acceptable use of information system resources. The organization receives signed acknowledgement from users indicating that they have read, understand, and agree to abide by the rules of behavior, before providing authorized access to Private Eyes information systems. This policy is periodically reviewed and updated as necessary.

Our security policies cover a wide array of security related topics ranging from general standards with which every employee must comply, such as account, data, and physical security, to more specialized security standards covering internal applications and information systems.

Infrastructure Security – A control framework which includes architecture reviews, vulnerability testing, system hardening, and malware protection.

Data Protection and Data Privacy – Implemented controls designed to safeguard information which covers data classification, secure storage, handling, transmission, and destruction.

Physical Security – Implemented physical access controls on all firm facilities including office spaces, near site and far site locations, data centers, and storage facilities.

Vendor Security Information -Security risk management is built into the company’s vendor management process which covers all vendors.



Sandra James

CEO & Founder