SecurePRO™ Card of Edwin Mize

Identity / Know Your Translator™ data

Security procedures

Standard security procedures

  • Safeguarding of content: I take care to prevent confidential project files and content from being accessed by unauthorized parties.
  • No discussion: I do not discuss confidential project content with unauthorized parties.
  • File deletion: I delete project files upon completion of work, or am willing to do so upon request.
  • No paper copies: I either do not create paper copies, or am willing to agree to shred them upon project completion.
  • Encrypted file storage: I understand how to, and am willing to agree to, store files only in encrypted form.
  • Password-protected folders: I understand how to, and am willing to agree to, password-protect file folders.
  • Encrypted file transfer: I understand how to, and am willing to agree to, send and receive project files in encrypted format.
  • Dedicated project folder: I am willing to agree to keep separate file folders for separate clients.
  • Remote backup: I have a regimen, available upon request, for backing up files remotely while work is underway.
  • Archiving: I have a regimen, available upon request, for maintaining copies of project files after completion of work.
  • No unauthorized sampling: I use samples from completed translations (in portfolios, or otherwise to market my services) only with client permission.
  • Confidential collaboration: I do not disclose confidential information when obtaining assistance from fellow translators on term selection, etc.
  • No ownership claims: I am willing to agree that completed translations are the property of the client or client's client, and waive any personal rights thereof.
  • No foreign TM/MT: I am willing to agree not to use translation memories (TMs) or machine translation (MT) systems that contain data, or that have been trained using data, from other clients.
  • Confidential TM/MT: I am willing to agree not to use content from projects worked on for one client, to add to translation memories or train MT systems that are used with other clients.
  • TM/MT deletion: I am willing to agree to destroy any translation memories, machine translation engines and glossaries created specifically for a given project, upon completion of the project.
  • No cloud MT/TM/etc.: I am willing to agree not to use any cloud-based translation memory, machine translation, optical character recognition (OCR) or other such cloud-based services that involve disclosure of content to third-party systems.
  • No TM/MT sharing: I am willing to agree not to share a given client's TMs and MT training data with other professionals.
  • Reference material confidential: I consider reference materials to be confidential; I do not share such materials, and would not use them on other client's projects, without permission.
  • Home office: I have an office in my home.
  • Dedicated space: My home office is in its own room.
  • Private space: I am the only one who uses my home office.
  • No public spaces: I work exclusively, or almost exclusively, from home.
  • On-site audit: I am willing to agree to make my home office available for on-site audit.
  • Dedicated computer: I have a dedicated computer for translation work.
  • Locked computer: My work computer is password protected.
  • Sole user: I am the only person who uses my computer.
  • Antivirus: My computer has up-to-date, licensed antivirus software.
  • File scanning: All incoming/outgoing files are scanned for viruses and malware.
  • OS updates: Updates to my operating system are auto-installed.
  • Software updates: I have a tool that checks for updates to all of the software on my computer.
  • Anti-ransomware: I have an up-to-date, licensed anti-ransomware program.
  • Private screen: My computer's screen is not visible through a window.
  • Encrypted hard drive: My hard drive is encrypted.
  • File auditing: I understand how to, and am willing to agree to, enable security logging and file auditing.
  • Locked phone: My mobile phone is protected by password, fingerprint or facial recognition.
  • No pirating: I do not use pirated software.
  • Anti-theft: My work computer has hardware anti-theft features.
  • Work on server: I am willing to agree to perform work remotely on tools/applications/portals controlled by the client.
I worked for the National Security Agency for almost 35 years. How much security do you want?
Procedures and policies


Created by Evelio Clavel-Rosales
SecurePRO™
Program

Identity information (Know Your Translator™)

Data that has been verified: Additional data that has been provided but not verified:
  • Phone: Mobile
  • Address
  • Citizenship: United States

ProZ.com history

Registered Oct 2012
Paying member OCT 2012
Has visited ProZ.com in the last 31 days.
Close this window