We understand that information security is a key concern area for clients and imperative for successful cooperation between companies. At Verve we have defined and strictly adhere to security policies defined for employees, contractors, consultants, temporaries, and other workers.


We Respect Your Privacy

Among our Security Policies the following ones are the most important

Security & Confidentiality

Verve understands the anxiety one would go through before making someone else privy to the ideas and concepts that have been nurtured and evolved over a period of time. We believe in ethical conduct of business, and consider protecting the vital classified information received from client and built in to the project sacrosanct. We believe in providing security and confidentiality at all levels of vulnerability.

IPR Protection

Verve respects the IPR of the product/solution being conceptualized, designed, developed, maintained, supported and enhanced by it. Hence, unless otherwise mutually agreed upon and pursuant to the business model undertaken, all materials, produced by Verve in the course of project execution, e.g. software, source code, data structures, documentation, design options, etc., fully belong to the client.

On contract termination, all material will be transferred to the client, and after the confirmation of the successful receipt, all electronic copies of this data will be purged unless instructed otherwise by the client.


Company NDA: We ensure very high-level protection of the data received from our Customers while executing their orders. We will sign the NDA with the client in a mutually agreed format.

Employee NDA: Verve requires each of its employees to sign a very strict contract, preventing disclosure of any information.

Network Security

We recommend using a VPN connection to transfer data to and from our Offshore Development Center. This ensures the security in transportation of data. We will also make sure that the network used by a product team is independent of the rest of the Verve computing network to avoid any internal leakages.

Document Security

All the electronic material is protected by access level passwords. Even, the printed physical copies of such material are secured and not allowed out of the facility.


Read more