For employers

Hire this AI Trainer

Sign in or create an account to invite AI Trainers to your job.

Invite to Job
S

Suresh Babu

Agency
INDIA flag
Trichy, India
$2.00/hrExpert20+

Key Skills

Software

CVATCVAT
LabelboxLabelbox

Top Subject Matter

No subject matter listed

Top Data Types

ImageImage
TextText

Top Task Types

Bounding Box
Polygon

Company Overview

D Square Technologies No.91 E.B Colony, Kajamalai, Tiruchirappalli, Tamilnadu, India. Email: sureshbabu@dsquaretechnologies.in For Details Contact: P. Suresh Babu, B.E., Managing Director, +91 94433 03688 We are an Indian company and have been serving global customers since 2005. Starting with just a few people, we have grown in size and maturity. We are based in Tiruchirappalli one of the savvy cities of Tamilnadu in India. At D Square Technologies, we function as a part of your team in enhancing your goals. And facilitate your growth by helping your business succeed. Our Team Our team comprises a talented mix of dedicated professionals; management graduates, business analysts and customer service representatives, with people who have extensive experience in the ITES segment and who have worked in Operations and Business Development in Senior Management capacities. Our Services • Image Labelling / Annotation • Text Labelling / Annotation • 2D,3D Lidar Annotation • Images /Photos Collections • Invoice and Receipt Data Entry • Documentation Services • Bulk Data Entry Services • Logistics Data Services • Genealogy Data Processing (Handwritten) • Litigation Support Services • Data Conversion / Transcription • Word / Image / Form Processing • E-Publication • XML, HTML Tagging / Conversion D Square Technologies Our Strength Our core strength is knowledge about a vast range of Data projects and getting these projects executed properly. We have served customers and completed so many diverse kinds of short- and long-term projects, our team has developed the ability to understand the customer's requirements and then make sure the project is conducted according to the customer’s needs. • We have 40 well versed and experienced workers in Data Entry / Conversion / Labelling / Annotation / XML tagging and E-Pub among other skill sets. • 10 Proof Reader (Our team of experienced proofers is very good in checking for any human- errors during the process.) • 2 Team leader and shift in charge Our location in Tiruchirappalli the center of action, keeps us in contact withthe ground realities of data conversion and entry Our Infrastructure • More than 2500 square feet area utilized for the purpose of the Enabled services. • 60 client machines and 1 server with 1 Gbps Internet connectivity. • Having a capacity to run 3 shifts per day. • Online-UPS, Inverter and 15 KVA Generator. • Have 2000 square feet space for future enhancement. • Our location in Tiruchirappallithe center of action, keeps us in contact with the ground realities of our projects. Our Commitment The team is willing to go the extra mile by ensuring that we are always there for our customers. • A round-the-clock customer engagement team • A dedicated team focused on project management. • Our specialty lies in delivering the clients’ requirements on-time, every- time. No.91 E.B Colony, Kajamalai, Tiruchirappalli, Tamilnadu, India. Email: sureshbabu@dsquaretechnologies.in D Square Technologies No.91 E.B Colony, Kajamalai, Tiruchirappalli, Tamilnadu, India. Email: sureshbabu@dsquaretechnologies.in We Care We are sensitive to customer concerns and ensure absolute confidentiality and privacy of any information that is given to us. Customers can specify their preferred method of contact with us and we will not disclose their identity without expressed or written consent from them. We strive to make customers comfortable by making the process seamless and hassle free. D Square Technologies will find you the best match depending on your ITES requirements.

Expert

Security

Security Overview

1. Introduction At D Square Technologies, we prioritize data security, confidentiality, and privacy protection across all non-voice BPO operations, including data processing, annotation, ePublishing, and content management services. We follow strict internal protocols and industry best practices to ensure client data integrity, compliance, and secure handling at every stage of the workflow. 2. Data Security Measures 2.1 Secure Infrastructure Access-controlled production environment Dedicated systems for project execution Regular system updates and antivirus protection Firewall-enabled network security 2.2 Access Control Role-based access (RBAC) for all employees Unique user IDs and strong password policies Restricted access to client data on a need-to-know basis USB ports and external device access disabled (if required by client) 2.3 Data Transmission Security Secure file transfer methods (SFTP, VPN, encrypted email) Encrypted data sharing protocols Client-specific secure portals (if applicable) 3. Data Privacy & Confidentiality 3.1 Non-Disclosure Agreements (NDA) Mandatory NDA signed by all employees Project-specific confidentiality agreements Vendor/partner NDAs enforced 3.2 Data Handling Policies No unauthorized copying or sharing of client data Data used strictly for project purposes Masking or anonymization of sensitive data (if required) 3.3 Clean Desk Policy No physical documents left unattended Restricted use of paper in production areas Secure disposal of printed materials 4. Compliance & Standards Adherence to GDPR (General Data Protection Regulation) principles (where applicable) Follows ISO 27001-aligned practices (if not certified, say “aligned”) Compliance with client-specific security guidelines Periodic internal audits and reviews 5. Employee Security Practices Background verification for all employees Regular training on data security and privacy Awareness programs on phishing, data leaks, and cyber threats Strict disciplinary action for violations 6. Physical Security Restricted access to office premises CCTV surveillance in work areas Visitor log and access control Secure workstations with auto-lock systems 7. Data Backup & Recovery Regular data backups Secure storage of backup data Disaster recovery plan in place Business continuity planning (BCP) 8. Incident Management Defined process for security incident reporting Immediate action on data breaches or risks Root cause analysis and corrective measures Client notification protocols (if applicable) 9. Client Data Retention & Deletion Data retained only for the project duration Secure deletion after project completion Data destruction certificates (if required) 10. Continuous Improvement Regular policy updates Security audits and risk assessments Adoption of new technologies and tools for enhanced security Conclusion D Square Technologies is committed to maintaining the highest standards of security and privacy, ensuring that client data is handled with maximum confidentiality, integrity, and protection.

Labeling Experience

CVAT

Data labelling

CVATImageBounding BoxPolygon
“The client will provide images of roads from major Indian cities, featuring traffic signals and objects such as motorcycles, auto-rickshaws, cars, heavy vehicles, trees, etc. These objects will be annotated using appropriate bounding boxes in the CVAT tool.”

“The client will provide images of roads from major Indian cities, featuring traffic signals and objects such as motorcycles, auto-rickshaws, cars, heavy vehicles, trees, etc. These objects will be annotated using appropriate bounding boxes in the CVAT tool.”

Not specified