For employers

Hire this AI Trainer

Sign in or create an account to invite AI Trainers to your job.

Invite to Job
BUNCH

BUNCH

Agency
Philippines flagManila, Philippines
$6.50/hrExpert120+GDPR

Key Skills

Software

CVATCVAT
DataloopDataloop
DatasaurDatasaur
DataturkDataturk
Figure EightFigure Eight
Google Cloud Vertex AIGoogle Cloud Vertex AI
Kili TechnologyKili Technology
LabelboxLabelbox
LabelImgLabelImg
Label StudioLabel Studio
SuperAnnotateSuperAnnotate
V7 LabsV7 Labs
Other
Internal/Proprietary Tooling

Top Subject Matter

No subject matter listed

Top Data Types

ImageImage
TextText
VideoVideo

Top Task Types

Action Recognition
Bounding Box
Entity Ner Classification
Polygon
Segmentation

Company Overview

We build teams of data labelers to process large training datasets for AI model development. Our in-house specialists cover different verticals, including self-driving, healthcare, energy, transportation, entertainment, and more. We achieve the highest quality through detailed labeling guidelines, expert involvement, and proven QA techniques such as quality audits and double-pass annotation. We are equipped to handle both short-term projects and recurring volumes of data.

ExpertEnglishSpanishIndonesianVietnamese

Security

Security Overview

1. Organizational Procedures • Record of Processing Activities accessible by the Data Protection team in order to identify and isolate data incidences and trigger contingency and escalation measures • Code of Conduct and Data Protection signed by all employees involved in client operations • Data Breach Protocol enabled to all the employees involved in client operations • Regular training of employees on data privacy measures. 2. Pseudonymisation and Encryption • Encrypted data transfer between client and server • Pseudonymisation of personal data for development and related testing purposes 3. On-Premises Confidentiality • Network security controls • Enterprise firewall • Intrusion detection systems, and other traffic and event correlation procedures designed to protect systems from unauthorized access • Whitelisted-only devices policy on-premises and restricted remote access • Usage of anti-virus software including automated updates 4. Entry Control • Rigorous office access concept including multiple locked doors with keys and/or biometric access available only to regular employees and cleaning staff • Access to the office for visitors only accompanied by an employee • Video surveillance of the main entry door and the entry area. • Documented system access concept including user access removals • Effective entry authorization controls through an adequate locking system (e.g., security key with documented key management, electronic locking systems with documented authorizations management) 5. Access Control • Automatically activated and password-protected computer locking • Two-factor authentication required for employees exposed to customer data • No access to personal data in a non-authenticated way • Prevention of brute force password entry attempts to BUNCH • Restriction to account access to company network for BUNCH customers possible • Logging of accesses (including failed ones) to the application • Detailed process in place with customers to ensure data

Security Credentials

GDPR

Labeling Experience

Satelite imagery annotation

Internal Proprietary ToolingImageClassificationDiagnosis
A full time dedicated team of 20 annotators and 5 quality assurance specialists meeting productivity and quality metrics consistently.

A full time dedicated team of 20 annotators and 5 quality assurance specialists meeting productivity and quality metrics consistently.

2019

100,000 Images for Autonomous Driving

OtherImageSegmentation
Complex Image segmentation with 30+ classes and high accuracy

Complex Image segmentation with 30+ classes and high accuracy

2020 - 2021