Please select your page

Statement of Commitment

Data Privacy and Security

Comtech is committed to preserving the confidentiality and security of sensitive information entrusted to Comtech. Policy and procedures have been developed and implemented to ensure comprehensive data privacy and security.

Comtech has designed its data privacy and security systems to ensure it is consistent with applicable privacy and security industry standards. However, we also have kept pace with the broader range of data privacy and security standards that recently have emerged in order to address concerns over the explosion of identity theft and data breaches. Our policy and procedures address these issues and we continually reevaluate and retool our policies and procedures to ensure they meet and or exceed industry standards.

Comtech is a strategic partner for companies that are looking to grow their business through data driven solutions, printing, graphic design, promotional products, corporate apparel, direct mail, web development, SEO services and complete marketing solutions. All of these services and others could involve the handling of personal information maintained by your company.

Our system includes administrative, physical and technological safeguards to protect the privacy and security of the secure information we handle for our clients. Examples of these safeguards include:

Designated Privacy and Security Officer

Comtech has a designated a privacy and security officer who has specific responsibilities to develop, review, update and enforce the privacy and security policies and procedures.

Secure Facilities

Access to our facilities is limited to authorized personnel.

24/7 Video surveillance of critical system areas

All facilities have 24-hour monitored fire and alarm service.

Visitor logs are maintained and visitors and vendors are escorted during their visit.

Emergency, Data Breach, and Contingency Planning

Comtech has developed an internal data breach response plan to ensure that should a breach of secure information occur, the company will be able to, among other things, react quickly to contact the appropriate client and coordinate a response.

Written Policies and Procedures

Comtech maintains written policies and procedures that outline its data privacy and security safeguards all of which are designed to, among other things, prevent unauthorized use or access to secure information. These policies and procedures are periodically reviewed and updated as necessary and appropriate.

Data Protection Agreement

Comtech offers a data protection agreement for our clients. This ensures the client that Comtech’s data privacy and security responsibilities are tailored to the clients needs.

Employee Screening, Training, and Visibility

All employees must undergo a background check, employment history verification and drug screening prior to employment.

All employees are required to sign a privacy and confidentiality agreement when hired.

All employees must request and receive access to Comtech systems.

Each Comtech employee undergoes regular training concerning Comtech systems.

Employees are subject to discipline for improper use or disclosure of personal information or for failure to follow policy and procedures.

Staying Ahead of the Curve

Comtech actively monitors legal developments relating to data privacy and security in order to be sure its systems meet and or exceed current industry standards, and to be better prepared to anticipate and address our client’s needs in this regard.

Questions about security should be directed to Comtech’s information systems department, at 117 E Hill Street, Oklahoma City OK 73105, Attention: IS Department. Or e-mail it@accesscomtech.com.

Statement of Commitment

Processing Integrity

Comtech is committed to preserving the data integrity of all client data. Policy and procedures have been developed and implemented to ensure comprehensive data integrity.

Comtech has designed its data integrity process to ensure client data will remain intact. Several checksums are in place to prevent incorrect data usage. Our policy and procedures address these issues and we continually reevaluate and retool our policies and procedures to ensure they meet and or exceed client expectations.

Comtech is a strategic partner for companies that are looking to grow their business through data driven solutions, printing, graphic design, promotional products, corporate apparel, direct mail, web development, SEO services and complete marketing solutions. All of these services and others could involve the handling of data maintained by your company.

Our system includes, physical and technological safeguards to protect client data from unauthorized changes or improper usage. Examples of these safeguards include:

Data Entry

All data is screened for completeness and total counts compared with expected outcome.

All data is imported using automated systems.

Employee Peer Review

Comtech employees have a responsibility to check and review every other employee involved with the production of work orders.

Checklist forms and peer reviews of each step in the process occurs in each individual department and across departments.

Data is proofed by comparing production material with original data source.

Reconciliation

Every work order has a unique number assigned.

Every work order is reconciled after each process. Total counts are confirmed before and after each process.

Final reconciliation occurs in accounting department where all totals are compared and confirmed.

Written Policies and Procedures

Comtech maintains written policies and procedures that outline its data integrity, all of which are designed to, among other things, prevent improper use or unauthorized changes to client data. These policies and procedures are periodically reviewed and updated as necessary and appropriate.

Questions about security should be directed to Comtech’s information systems department, at 117 E Hill Street, Oklahoma City OK 73105, Attention: IS Department. Or e-mail it@accesscomtech.com.

Statement of Commitment

Availability

Comtech is committed to the availability of services and the customer experience. Comtech has designed its systems to minimize the risk of downtime and ensure the utmost availability of systems at all times. Policy and procedures have been created to address, preventive maintenance, fault tolerance, data center location and design, patch management and antivirus software, backup procedures and IT disaster recovery planning. Our policy and procedures address these issues and we continually reevaluate and retool our policies and procedures to ensure they meet and or exceed industry standards.

Comtech is a strategic partner for companies that are looking to grow their business through data driven solutions, printing, graphic design, promotional products, corporate apparel, direct mail, web development, SEO services and complete marketing solutions. All of these services and others may be affected by availability issues.

Comtech systems include, physical and technological safeguards to ensure systems are protected too the best of our abilities from unnecessary down time. Examples of these safeguards include:

Preventive maintenance

The IT department maintains network equipment by following a schedule and performing maintenance procedures.

Server maintenance includes, migrating workloads off server, physical inspections, airflow checks, hard disk scans, event-log alerts or trends, test and installing patches and updates, etc.

User desktop maintenance includes, emptying recycle bins, deleting .tmp files, files that begin with a tilde, running Scandisk, checking browser histories and cache files, cleaning temporary internet files, updating drivers as needed, service pack updates, etc.

Fault tolerance

Use of redundant components

Comtech utilizes secondary telecommunications and internet systems in order to recover communications and online capabilities when the primary system has been compromised. Examples of this are, primary telecommunications or internet provider maintenance or outage outside the control of Comtech. Comtech telecommunications will not be compromised with power outages.

Secondary server will be in place in case of primary server failure of any kind.

Data center location and design

Restricted Access

Fire suppression

Air conditioning

Uninterruptible power supply (UPS)

Surge protection

Patch management and antivirus software

All network and computer devices will have proper virus protection software, current virus definition libraries, and the most recent operating system security patches installed.

Network and computer devices must be appropriately secured to protect the confidentiality, integrity, and availability of all Comtech data. The IS Department is responsible for the overall patch management implementation, operations, and procedures. While safeguarding the network is every user’s job, IS Department is the division that ensures all known and reasonable defenses are in place to reduce network vulnerabilities while keeping the network operational.

Backup procedures

Full daily backups are completed and stored with an offsite third party provider. Incremental and differential physical backups are kept on site and off site, located in a secure environment. Primary and secondary servers are protected with surge protection and UPS systems that allow safe function and or recovery of data in case of power outages. A disaster recovery plan exists for the IT department.

Disaster recovery plan (DRP)

A disaster recovery plan exists for the IT department. This plan may be used for a cold or hot site and covers all critical software and data utilized by Comtech systems. Comtech also utilizes cloud services that allow users with proper access to utilize critical systems and data. Comtech tests recovery systems annually and periodically as needed. Comtech also revises and updates the DRP on a regular basis to meet ongoing changes.

Written Policies and Procedures

Comtech maintains written policies and procedures that outline the availability of systems, all of which are designed to, among other things, prevent improper use or unauthorized changes to the system. These policies and procedures are periodically reviewed and updated as necessary and appropriate.

Questions about security should be directed to Comtech’s information systems department, at 117 E Hill Street, Oklahoma City OK 73105, Attention: IS Department. Or e-mail it@accesscomtech.com.


Forgot your password? |  Forgot your username?

×