security settings.
1.2. Access Level Management and Audit Trail
All activity on Minutes Services cloud file server is fully auditable. Access to
clients' files and information is strictly managed with Microsoft Azure and 365
access level management, password protection, and two-factor
authentication.
We use Microsoft 365 for strong granular access controls to ensure our staff
only have access to what they need. Thus, clients’ content is only accessible
to the people specifically managing or working on their project which includes
minute-taker, editor, technical support personnel, and project manager.
Moreover, access to our portal and server requires two-factor authentication,
authorization, and it is restricted to specific whitelisted geographic locations
and IP addresses.
1.3. Employee and Subcontractor Confidentiality Agreements
All employees of, and subcontractors to, Minutes Services sign a strict non-
disclosure and confidentiality agreement before the commencement of work.
Non-disclosure agreements can also be made available at the client’s request.
1.4. Document Delivery
Completed meeting minutes and transcripts are delivered by default via
upload to the client account on our secure online portal, thus restricting
access to those holding the login and password details. This method is
protected by standard SSL/TLS protocol. If preferred, documents can be
returned via email in addition to being uploaded.
Clients can grant other members of their team access to our secure customer
portal to upload meeting recordings, book minute-takers, download meeting
minutes, transcripts, and invoices.
1.5. Continuous Monitoring and Security Threat Detection
Minutes Service Infrastructure team uses user account logs and other threat
monitoring tools for sophisticated monitoring and alerting of cyber security
threats and breaches. These include:
User and Guest Sign-ins – Monitoring the usage of company portal, files, and
applications by internal and guest users, and user sign-in activities.
Activity Audit logs – Auditing logs for all changes made to company files and
resources by various internal and guest users.
Risky sign-ins – Monitoring and alerting on indicator for a sign-in attempt that
might have been performed by someone who is not the legitimate owner of a