Some aspects of our operations, including handling client source code and having privileged access to systems, present clear information security requirements, however it is expected that we treat all our client and internal hard copy and electronic information in a secure manner, throughout all our processes.