ComPass Solutions Inc. provides the capabilities you need the most with the reliability expected by your customers. We have constructed an awesome combination of advance equipment, experienced staff, and quality management practices so that you can deliver premium service to your customers. ComPass brings you:

  • Redundant servers and T1 lines/DSL to deliver maximum up time


  • Enormous data and VoIP capacity.

  • We use only Cisco 1841 routers due to their reliability in the industry.

  • Back up power generator so we don't suffer the same blackouts that most companies do.

With over 6 years in the telecommunications industry, ComPass Solutions Inc. has the expertise, and experience you can trust to take care of your business. Our IT employees have a combined 25 years of experience working in the telecommunications and similar industries. Be confident that we can solve any problem in a timely manner so there is little or no lost time on your account.

You can rely on ComPass Solutions Inc. for 24/7, 365 days a year support and service.


At ComPass Solutions Inc. we take the security of your data VERY seriously! Your files are encrypted and secure from the moment you upload them to our secure server to the time you receive them back. We use YouSendit Business Plus Program for the file transfer and storage. The security of all conversations and information we receive from your customers is treated with the same level of security as the files you would originally send us to help set up your account.

Here are some of the key security measures with our file transfer system.

I. Secure File Transfer via SSL

1. In Transit Security with YouSendIt
Our clients first upload a file to a server in the YouSendIt data center. An email is automatically generated to our production manager, who then downloads the file to her computer. To ensure that data is not compromised in either transfer, YouSendIt employs the Secure Socket Layer (SSL) protocol.

SSL works by encryption. A secure website first sends a user's browser a public encryption key, which is used to construct another, unique, non-public encryption key. This key, which is known only to the web server and the user, is then used to protect all subsequent transfers of information. In practice, SSL provides a secure tunnel between two points on the Internet. Files transferred along this tunnel are wrapped in a layer of encryption that makes them impossible for third parties to view or compromise.

2. Data Confidentiality with YouSendIt
Using its SSL solution, YouSendIt can ensure complete data confidentiality. The encryption methods it uses are based on keys only available to the user and the server, making it practically impossible to decode the data sent, even if it is intercepted.

3. Data Integrity with YouSendIt
YouSendIt's SSL solution also ensures data integrity. That means that no outside source can modify data as it travels between an end user and a server. If data is changed in transit, the protocol automatically recognizes the modification and asks the client to resubmit the file.

II. Physical and IT Infrastructure

In addition to file transfer, YouSendIt has employed best practices security methods to ensure that customer's files remain secure while stored on its servers. These include everything from the physical security of YouSendIt data centers to the firewalls and other measures the company uses to protect its servers from electronic attack. Some of the top features of YouSendIt's infrastructure security include:

1. Virus Scanning
The server farms that store customer data at YouSendIt are equipped with antivirus software that is automatically updated on a regular basis. They scan every incoming file for viruses and provide alerts to customers if a virus has been detected.

2. Data center and Security
Public access to YouSendIt offices is limited to certain rooms, which are under constant surveillance by the staff. The data centers do not allow any public access; only identified persons acknowledged by the management may enter them. Their entry and exit time is recorded, and they must not only have a correct password but they also must pass a biometric scan to gain entry.

3. Multiple data centers
To ensure that data is never lost, YouSendIt maintains two separate data centers, both hardened to resist fire, earthquakes, and other natural disasters.

4. File deleting
Users can delete files from YouSendIt's servers on the Sent Items page. The page contains a list of all files sent by a user that are still on the server. By clicking the trash can icon next to an item, users can delete those files. Files are also automatically deleted after a set period of time that varies with a user's service level.


GBLA Compliance

ComPass complies with the privacy provisions of the Gramm-Leach-Bailey Act (GBLA), a law that governs certain activities of the financial services industry. Under GBLA, ComPass qualifies as a service provider. To achieve compliance, we have developed a security policy and we store and transfer client information only for the purposes for which they were intended. For more information, please see

Our security measures don't end with the transfer and storage of your data:

  • ComPass values the privacy rights of all customers and strictly adheres to ethical business practices and the Gramm-Leach-Bailey Act (GBLA) to guarantee that we give our clients maximum security for all data.

  • Our training team has developed and implemented extensive educational programs for security training.

  • We assure confidentiality of data and ensure that all employees sign employment contracts with non-disclosure and confidentiality clauses. These agreements stress the confidentiality of all data. Prior to employment, all of our employees go through extensive security and background screening.

  • Only authorized personnel are allowed access to our production facility. We have a security guard posted outside to enforce this rule. To further insure the confidentiality of all files, the facility itself has no windows. In addition, employees are not even allowed to bring cell phones, cameras, or their personal bags into the facility. They each have a personal locker outside to use.

  • All external devices, including floppy and CD-Rom disk drives, and USB ports, are disabled to avoid copying, transmitting or reproducing of files.

  • Our data management system grants access to users at various security levels. All users are required to enter individually assigned passwords to gain access to our system and data. We monitor all of our employees’ activities and the log reports are checked on a daily basis.

  • We have installed up-to-date firewall systems and the latest antivirus software to protect our system. We also employ full time IT experts to deal with any problems that may arise with the software or hardware.

  • Access to the Internet is limited to employees on an “as-needed basis”. None of our computers can access sites like Yahoo, Hotmail or Facebook, so employees can not share sensitive information. Some employees will be granted limited Net access if the project/account requires that they visit certain, pre-approved sites for research or other purposes.

  • Call Center Customer Service
  • Inbound Teleservices and Sales
  • Outbound Sales/Marketing
  • Financial Services
  • Account Services
  • Account Appointment
  • Account Setting
  • Account Returns
  • Telemarketing
  • Level-1 Help Desk, Trouble-tickets
  • Technical Helpdesk
  • Inbound Sales
  • Order Taking
  • Marketing Surveys
  • Lead Generation Programs