| With our highly scalable, globally networked secure offshore computing and physical infrastructure facilities, combined 
with the unique onsite, offsite, offshore and nearshore delivery models, we deliver the best possible ROI to our clients.
 We understand your business and build strong working relationships that deliver measurable business value. Our unique 
engagement models, coupled with a competitive pricing structure and best-in-class methodologies, do not just cut costs 
but drive value into the enterprise, right from day one. Quality commitments and innovative thinking are inherent to all 
our client engagements.
 Transition MethodologyOur transition roadmap is focused on key activities and documents that build a strong foundation for a sustained delivery, 
which encompasses the transitioning process of “as-is” understanding, process maps, communication plans, thorough 
understanding of IT requirements. Knowledge management and business intelligence help in defining the baselines prior 
to transitioning a process and drawing comprehensive SLA backed by stringent reporting systems. A robust business 
continuity plan is prepared during the transition phase of the project.
 Planning :The transition phase commences with the establishment of a Program Management Office (PMO) that helps plan 
and execute transition effectively. The PMO is tasked with ensuring the efficient migration of the identified processes.
 Execution :We deploys domain, process and technology teams to address each of the transition tracks. These consist of:
 
 |  | Knowledge Transfer:Includes the construction of operating procedures, preparation of training documents, and 
training executives to execute the process offshore.
 Technology Transfer:Identifies the optimal network architecture, procurement of bandwidth and systems, and 
installation, testing and deployment of technical infrastructure.
 Operating preparedness:Includes recruitment, induction and site preparation | 
 Infrastructure
Multiple locations to offer Disaster Recovery and Business ContinuityState-of-the-art building management, security and power backup systemsRobust highly reliable network infrastructure with multiple redundancies Security of the highest orderWe are committed to respecting, protecting and safeguarding the privacy and confidentiality of data entrusted to us by our 
customers. To ensure data security, we have developed an information security policy and data privacy policy that also 
takes into account the safeguards and controls required to be adhered to by RANSI BPO. In addition, we have implemented 
a rigorous set of standard operating procedures designed to provide our clients with the requisite privacy and security 
necessary to achieve the trust and confidence of our clients. Physical security
 |  | Building Security Systems:round the clock access to the building is restricted to authorized associates only. All
physical entry and exit points are manned by trained security personnel. The presence of security personnel is 
mandated at the entry / exit points.
 Access Cards:Our delivery area has an additional security layer with swipe-card based restricted entry for 
associates. This ensures that unauthorized people have no access to the delivery area. | 
 
 System/Network Level
 
|  | LAN:RANSI BPO’s Local Area Network is designed to provide logical separation for each customer, or even various 
projects of the same customer, if required. Need-based access for permissions and authorizations, with 
adequate firewall and archival facilities, is ensured.
 Passwords and Restricted Access:We feature password-protected network and telecommunications access, with 
access to internet and e-mail restricted through a network firewall and use of proxy server |  Client/Project LevelData Security between clients is ensured through dedicated /separate areas for different clients, restricted physical as well 
as network access and LAN separation for each client. Each client has a secure LAN and access is carefully controlled by 
multiple levels of security.
 Associate LevelRestricted and need-based access, based on roles which are reviewed periodically. More importantly, the attitude of the 
people we recruit are tested through psychometric tests. Confidentiality contracts and non-disclosure agreements are 
signed with each Associate and background checks are run on them. Strict norms, for information storage and disposal of 
data - both electronic and physical - are mandatory.
 Our Information Security Policy covers ten areas of information security controls: 
|  | Security Policy Security Organization
 Asset Classification and Control
 Personnel Security
 Physical and Environmental Security
 IT Operations Management
 Access Control
 Systems Development and Maintenance
 Business Continuity Management
 Compliance
 
 |  Business Continuity & Disaster RecoveryDisasters can strike without a warning and the results are often, unpredictable. It can take weeks or months, even years for 
an organization to recover from the outages or service disruptions caused by adverse events such as natural or man-made 
disasters. Our BCP is geared to meet all possible contingencies, be it operational, infrastructural or unforeseen natural 
calamities. Business Continuity Planning begins right from the requirements gathering phase. This is reinforced during the 
transition phase. Business Impact Analysis (BIA), Recovery Time Objective (RTO) Analysis, Recovery Point Objective (RPO) 
analysis and Disaster Threat Analysis are the various steps carried out while implementing the BCP Strategy.
 DrillOur business continuity management process includes periodic fire evacuation drills , awareness testing, paper 
walkthroughs and simulations. Key Features
 
|  | Emergency response teams are formed, and trained on recovery procedures Highly reliable network infrastructure with multiple redundancies
 Multiple facilities well-connected with high bandwidth links
 Robust backup practices for critical data
 Power redundancy through generator sets and high-performance UPS systems
 State-of-the-art building management and security systems.
 |  Risk Management
A value scorecard outlining key performance indicators that identify and monitor risk, and client service levelsFacilitates the measurement of progress of critical success factors during integration (client satisfaction, personnel 
   satisfaction, operational & technology efficiency, financial performance, etc.) Program Management Office ( PMO )
A central program management entity that coordinates the activities of key stakeholdersFacilitates project tracking and reporting, issues management, knowledge management, and program communication 
   support.An approach that maximizes speed, focus and accountability  |