BQT Inc.
International Communication & Consulting
Technology &
Best Practices
BQT eWorld Platform
Caring for Personal Information
BQT Best Practice Clearinghouse
Balanced Planning
Collaborative Project Management
ISO 9001:2015
Language Tools


Security is key to our business. BQT takes every possible step in the design of operation of our systems to secure our customers’ and business partner’s assets and data. We conduct regular audits and closely monitor application and network vulnerabilities. We apply best practices and policies to our security operations.

Transactions & Data Integrity
All information submitted to our databases is handled with Transactions. This mechanism, used by banks for example to transfer funds, guarantees that the transactions succeed or fail entirely and ensures data integrity by avoiding partial posting. In addition, an efficient key and index structure ensures data integrity at the database level.

Data Quality is monitored daily, weekly, monthly, and at end-year close alerting of any anomaly within the data structure.
3 Token Security
BQT eWorld Platform uses a 3 token security mechanism to secure the connection between the browser, web application and database.
Sensitive data is encrypted at the application and database level using some of the most advanced encryption algorithms available.
Network Protection
Perimeter firewalls and edge routers block unused protocols. Internal firewalls segregate traffic between the application and database tiers. Intrusion detection sensors throughout the internal network report events to a security event management system for logging, alerts, and reports. A third-party service provider continuously scans the network externally and alerts changes in baseline configuration.
Access Control and Physical Security
Our datacenter is physically secured and features access control and full surveillance systems. Servers are caged and asset addition, removal and repair are tracked.