Data Security & GDPR

Data Security & GDPR

Being ourselves as an accounting firm serving international & domestic clients, and have been serving accountancy firms & various multinational enterprises as our clients in the UK, and having their head offices based out of Germany, United States of America, Netherlands, Russia, Italy, Norway, Canada, Taiwan, Singapore, Australia, India and France, we have absolutely no-nonsense policy in terms  with the data security. Our latest and modern infrastructure both in terms of hardware and technology gives peace of mind to our international clients spread across the continents.

We are fully committed to protecting our clients’ data and it stands as a testament towards our zero tolerance for data security, we can safely say that since ever we have started serving our accountancy firms client and other international clients, never ever, a single instance of our clients’ data compromise/leakage has been registered.

We have divided our security in to three layers of security and few of our security policy pointers have been enumerated here:
  • Biometric entry to the premises is restricted through finger punch in.
  • The office building is secured with manned security guards.
  • The workstation and facilities surveillance is done by CCTV camera 24 x 7.
  • Fire security and alarm system consisting of smoke and heat detectors, sensors. Fire-fighting equipment is also installed.
  • The facility also manned with security staff.
  • Surprise audits are carried out to ensure security policies are followed. Non Compliance with the same leads to disciplinary action.
  • Every employee has their unique username and password to access his/her workstation.
  • Electronic Devices such as mobile phones, PDA etc are not allowed on the production floor, the USB ports and other media drives are disabled.
  • Continuous monitoring of the web traffic and disciplinary actions are taken for any violations.
  • Access to the local drives of our server is restricted based on the process the employee is assigned to.
  • The appropriate backup mechanism is in place to prevent data loss.
  • Weekly update of the anti-virus pattern on every system.
  • After having gone through the rigorous interview process, our candidates are screened thoroughly and get their backgrounds check (BGV) done through our tied up third parties vendor.
  • Since employee base is the only authorized pool of people who have utmost responsibility to keep your data secure, all our candidates sign a confidentiality agreement with us besides explaining to them verbally the importance of confidentiality and data security.
  • Restricted access to internet websites through robust firewall mechanism and the same is allowed only if it is a process requirement.
how can we help you?

Contact us to discuss your Outsourcing requirements through CoSourcing Model.

“We have been very happy with the services we have received over the years. We are confident that when we have any questions, there is always someone there at the end of the phone or e-mail who will respond quickly and assist us with our concerns. Their approach is friendly, effective and they go beyond just being accountants, supporting us with their understanding and advice to help us to manage and improve our business. I would strongly recommend them to anyone”

Independent Consultancy Company
headquartered in UK working worldwide across the transport sector.

Network Infrastructure

When our clients share the critical financial data with us, it is not just the data, they are also delivering the trust they place in us and it is due to the kind of infrastructure we have set up in place.

As claimed by our infrastructure partner, our network infrastructure is GDPR ready as we have partnered with one of the leading FTSE company in the UK having state of the art secured data centres across the 8 locations worldwide and primarily in the UK running their operation with the highest of the security standards.

Our investments towards the network infrastructure stands as a testament towards our commitment.

Having invested in the cloud infrastructure with all the security controls does not make us fully satisfied as we must work on the computer/laptops in our office.

Thus, adequate measures are in place to secure the information assets; Such as installation of the antivirus in our systems which takes care of the vulnerabilities of the malicious activities and setting the password and username which keeps changing after periodic interval of time.

request a call back.

Would you like to speak to one of our AcoBloom experts over the phone? Just submit your details and we’ll be in touch shortly. You can also email us if you would prefer.

I would like to discuss:

Looking to offshore to scale up your business?

START FREE TRIAL
close slider