This site uses cookies.
Some of these cookies are essential to the operation of the site,
while others help to improve your experience by providing insights into how the site is being used.
For more information, please see the ProZ.com privacy policy.
This forum topic is for the discussion of the poll question "How do you handle confidentiality and data security when working with sensitive information?".
Some of my clients include in their NDAs and/or T&Cs what seems to be very strict security requirements but then in practice don’t act much differently than those who have no security requirements at all. Anyway, in over 40 years, I haven’t dealt with sensitive information very often…
WolfgangS
Christine Andersen
Andjelka Janjusevic
Subject:
Comment:
The contents of this post will automatically be included in the ticket generated. Please add any additional comments or explanation (optional)
Christine Andersen الدانمرك Local time: 00:04 عضو (2003) دانماركي إلى أنجليزي + ...
Several of the above
Dec 10, 2024
I work offline and do not use the Cloud, and I voted that I limit data sharing.
Signing NDAs is fine, but you must observe them in practice!
I have signed codes of conduct on this site and with the CIoL, for instance, because I prefer to work with small agencies who do not have elaborate procedures with NDAs and so on.
But basically, I do not allow others to access my work computer (apart from one trusted person if I have IT problems).
I work offline and do not use the Cloud, and I voted that I limit data sharing.
Signing NDAs is fine, but you must observe them in practice!
I have signed codes of conduct on this site and with the CIoL, for instance, because I prefer to work with small agencies who do not have elaborate procedures with NDAs and so on.
But basically, I do not allow others to access my work computer (apart from one trusted person if I have IT problems).
I take care not to talk about work in detail, or only to talk about general situations, not specific clients.
I do not use MT or AI, but they have to be checked out carefully too. ▲ Collapse
Maria Teresa Borges de Almeida
Andjelka Janjusevic
Giovana Zaltron
Subject:
Comment:
The contents of this post will automatically be included in the ticket generated. Please add any additional comments or explanation (optional)
Novian Cahyadi أندونيسيا Local time: 06:04 عضو (2024) أنجليزي إلى أندونوسي
Security
Dec 10, 2024
1. I use Linux.
2. I encrypt everything.
Sean O'Byrne
Andjelka Janjusevic
Subject:
Comment:
The contents of this post will automatically be included in the ticket generated. Please add any additional comments or explanation (optional)
Sean O'Byrne كندا Local time: 00:04 ألماني إلى أنجليزي
Most of the above.
Dec 10, 2024
I use all these means aside from seeking professional help.
Subject:
Comment:
The contents of this post will automatically be included in the ticket generated. Please add any additional comments or explanation (optional)
Gennady Lapardin الاتحاد الروسي Local time: 02:04 إيطالي إلى روسي + ...
Other
Dec 11, 2024
The general rule for any information: it is confidential irrespective of the content. If there are special requirements, the client should let me know.
WolfgangS
Gjorgji Apostolovski
Subject:
Comment:
The contents of this post will automatically be included in the ticket generated. Please add any additional comments or explanation (optional)
Pastey is an innovative desktop application that bridges the gap between human expertise and artificial intelligence. With intuitive keyboard shortcuts, Pastey transforms your source text into AI-powered draft translations.
Create customer quotes and invoices from within Trados Studio
Trados Business Manager Lite helps to simplify and speed up some of the daily tasks, such as invoicing and reporting, associated with running your freelance translation business.