 |
 |
|
|
|
|
 |
 |
Quality Priority |
 |
|
|
|
Top most priority in our LPO services
is quality. We opt six sigma quality
analyses to deliver timely output which
is request specific, along... |
|
|
|
More... |
 |
 |
|
Legal research |
 |
|
|
|
Legal research is one of the main
stream services of lexgeon. Our
Attorneys deal in complex research
projects by using... |
|
|
|
More... |
|
|
|
|
|
 |
|
 |
 |
Operative Process > Technology Security Steps |
 |
 |
 |
 |
 |
 |
 |
Technology Security Steps |
 |
|
|
|
 |
 |
 |
 |
Our users are bound to follow the parameters of strict policies for network usage. The most effective office security and surveillance features are adopted: the location segregated into separate work areas with restricted access. Entry to the work premises is controlled through ID card access. |
 |
All the employees have to sign a "Confidentiality Agreement" and background verification done before appointment. |
 |
The confidentiality of data is a major concern. Our knowledge |
|
 |
 |
|
|
base gathered from our research, helps us in comprehending the needs of overseas attorneys, law firms and other similar organizations relating to SLA, quality and security. |
 |
 |
|
|
|
 |
 |
|
|
 |
|
|
|
|
|
|
|
|
 |
 |
|
|
 |
 |
|