Protecting Your

Intellectual Property

Regardless of how you manage your intellectual property (IP next), we will make sure that you are protected at max. As your off-site team, we created and validated our own security measures and also mastered proven industry standards. We will make sure that your lawyers have all the weaponry to protect you from patent trolls and competitors in or out of your country.

More than just local IP Due Diligence process

Your NDA is backed up by our localized NDA version that is specifically tailored to local laws of any involved parties and subcontractors from our side.

Each of your extension team members signs it before he or she starts working with any sensitive information you share. You will receive localized NDA and its notarized translation right to your post box.

However, we are not stopping there. We will also provide you with a proper Assignment of Intellectual Property Rights agreement and Certificate of Originality for all the product features we work on. So you could be the first who files a patent application (if you decide to).

letter
ip

Best-in-class IP protection tools

At Blackbird Lab, we take great pride in providing all our clients with the best IT security setup available, ensuring your valuable assets are shielded from potential threats. With our comprehensive approach, we leverage the robust capabilities of Apple Business Manager(ABM) and Mosyle. ABM streamlines device enrollment, configuration, and management, enabling us to establish a standardized and secure setup across all devices. Within Mosyle, we employ over 50 meticulously chosen policies that fortify your IT security framework. These policies encompass encryption and authentication protocols, data backup strategies, device tracking, and more. Our setup enables us to react swiftly and decisively in the unfortunate event of hardware loss, guaranteeing that sensitive information remains confidential and inaccessible to unauthorized individuals. We are committed to providing the highest level of IT security, ensuring maximum protection and peace of mind.

Compliance

Here we will go through both compliances we follow and ones we will help you to meet. As a result, you are keeping under control all government regulations. Plus, people who use your SaaS product or service are fully protected.

CCPA

Plus

The California Consumer Privacy Act of 2018 (CCPA) gives Californian residents almost ultimate control over their personal information that you collect about them. Even a single newsletter opt-in form could become a nightmare with lots of devastating lawsuits.

We at Blackbird designed and developed a special solution that embeds to the back end of your product. It is going to be a one-click-job to collect and export collected user’s personal information in a neat PDF file or delete it all upon request.

GDPR

Plus

The General Data Protection Regulation 2016/679 is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas.

We at Blackbird designed and developed a special solution that embeds to the back end of your product. It is going to be a one-click-job to collect and export collected user’s personal information in a neat PDF file or delete it all upon request.

ISO 27001

Plus

ISO/IEC 27001 is an international standard on how to manage information security. The standard was originally published jointly by the International Organization for Standardization and the International Electrotechnical Commission in 2005 and then revised in 2013.

We at Blackbird use modern MDM solutions to manage our hardware and train our employees regularly. We are advancing our ways of working and planning to become ISO 27001 compliant in the nearest future.

Organization security

We assertively follow all the above compliances and standards. Nevertheless, security is not a one time job, it’s a continuous effort to regularly skill up employees, carefully manage IT assets, and to contain top operational security years around.

security
White board

Continuous security training

We believe that information security begins with educated and well-trained people. None of the information security policies will ever properly work without them.

It is required to attend monthly security meetups and annual security training for all of our current and new employees. However, our developers have to take even more of such training programs. People who work with your intellectual property must know how to protect it.

Fleshka

IT asset management and operational security

Blackbird is focused on keeping control of its IT inventory. We established and automatically up-to-date list of our hardware, software, produced and provided data, and other assets like our networks, employee devices, and more. Even such details as connected removable media, USB port activities can be tracked on demand.