Keeping It Secure

eTERA Consulting takes client data security very seriously, recognizing the importance of information and data in business and legal decisions.  eTERA has a number of policies, procedures and processes in place to make sure client data and information is highly secure.  Some of those audits and certifications include:

FISA_logo

NIST_logo

SSAE 16 Audited

GODADDY.COM VERIFIED & SECURED 

FIPS_logo

  • SSAE 16
  • Business continuity plan
  • Pandemic plan
  • Information security plan
  • Partnership with mindSHIFT for information technology resources
  • Partnership with Equinix for network security
  • Senior security officer on staff with CISSP certification and other advanced security credentials

eTERA Consulting's information security plan has been recognized by security experts as one of the best in the country.  eTERA Consulting makes a daily commitment to data security.

Client Data Security: eTERA Consulting takes client data security very seriously, maintaining more than 20 annual corporate security audits to meet our own standards of excellence. The team regularly passes with exemplary standing. eTERA maintains an independent SSAE 16 security audited technology infrastructure.

“eTERA completes more than 20 annual corporate security audits to ensure that we meet our own high standards and we consistently pass these audits with exemplary standing. In addition, eTERA maintains an independent SSAE 16 security audited technology infrastructure.”

Helping Clients With Data Security: As a data management company, specializing in litigation support and eDiscovery technology, eTERA Consulting understands that information has its complexities. Our clients hold highly confidential and sensitive data including personal health information, trade secrets, intellectual property, corporate documents, and litigation strategies. Data security is paramount within corporations and they need experts to assist with security in-house, as well.

Standards and Certifications: eTERA Consulting provides a variety of business and technical services for commercial and federal clients. Security operations are based on a variety of cybersecurity standards, laws and regulations.