11555 Heron Bay Blvd., Suite 200, Coral Springs, Florida, 33076 USA
+1 407 807 0100
Being an accounting and tax services provider, we are extremely careful about the security and confidentiality of data shared with us by our clients. Each and every piece of information shared with us is valuable, and we have incredibly stringent policies to ensure that data security is never compromised. We have been greatly successful in building the reputation of being the most reliable and trustworthy service provider owing to our data security and confidentiality policies. Our recurring client base is a testimony to justify our claims.
We have many compliance accreditations to ensure standardized deliverables with utmost data security:
For 100% data security and confidentiality, we have established stringent protocols to cover the physical as well as IT-related aspects of data security:
The physical security protocols take complete care of data security and data safety at our onshore location.
We are equipped with closed-circuit cameras on our premises to monitor and ensure safety.
We permit controlled entry to our production areas with our access control system at the entry point of our workplace.
Our server room has restricted access, which is authenticated by an access card. Only the IT team has access to the server room.
None of our workstations have CD R/W drives.
The USB ports of our workstations are also disabled.
Confidential materials, as well as documents, are stored securely, and complete protection is ensured.
All our workstations have the latest anti-virus software which does a quick scan every day. We also have scheduled boot scans and full scans to ensure complete data security.
Additionally, we also have anti-malware software in all our computers to scan the system twice a day.
We also have strong firewalls in place to ensure complete security of our IT network.
We continuously review and regulate account access requirements. We also practice deactivating accounts after separation of affiliation.
All workstations and servers have session controls for additional security. The session time- out time for all computers is 10 minutes and for servers, it is 5 minutes, respectively. Once locked, the system requires re-authentication to unlock.
We have effective backup operations like daily backups, differential backups and full backups scheduled to avoid data loss.
Users are not permitted to access personal email accounts on company accounts and vice versa.
We follow a paperless environment which ensures data security as well as helps us in being eco-friendly.
Outsider access is effectively prevented using IP authentication.
We have a policy to obtain signed non-disclosure and non-compete agreement from every employee at the time of hiring.
As per this agreement, no employee is permitted to share any information regarding the client with any third party without client’s consent.