(202) 360-4426
help@tamiaca.com
Tamia Consulting Advisors Tamia Consulting Advisors
  • Home
  • About TCA
    • About
    • Portfolio
    • FAQ
  • Our Services
    • Terms & conditions
    • Services
      • Bookkeeping Services
      • Payroll Services
      • PPP Loan Forgiveness
      • Tax Services
      • Accounting Services
      • Accounts Receivable Services
      • IT Services
    • Pricing
    • Pay Bills
    • Data security
    • INDUSTRIES
    • Clients
    • Google Maps
  • Insights
    • Case Study
    • Resources
      • Blogs
      • Newsroom
      • Client Stories
    • Career
    • Events
  • Contacts

Data security

Home » Data security

We have restricted access outsiders to the building and only the assigned employees will have access to your files, folders, and documents. All employees undergo a screening process and sign confidentiality agreements. Employees recruited with a proper reference check.

Data confidentiality is maintained through multiple means-physical security, technological initiatives, robust policies, and constant monitoring. Various initiatives under security are listed below.

Data Security

  • No data movement from the server as data is housed is not allowed under any circumstances without proper approval from the client.
  • Secure network and application access.
  • Regular security audits are performed.
  • All data is backed up on a regular basis in server farms to enable anytime viewing by the clients.

Physical Security

The operations area is secured to ensure that only authorized personnel are allowed access. Visitors are not allowed to enter the secure operations area. All critical servers are stored in access-controlled rooms.

  • Restricted Access to work areas and desktops.
  • Screening of visitors/employees by a security guard during entry and exit for data storage media like Floppies, CDs, Camera Mobiles, Digital Cameras, Pen Drives, and any other electronic device which can capture or store data and other external storage devices on the workstation are disabled.

 Personnel security

  • Verification checks are carried out at the time of appointment of the employees. Following controls are in place in this context.
  • Availability of satisfactory character references, one business, and one personnel.
  • Confirmation of claimed academic and professional qualifications.
  • Confidentiality – (Nondisclosure agreement) is signed by the employees of the company as part of their initial terms and conditions of employment.

Network Security & Internal Security

  • Use of secured line (128 bit SSL) to access and transmit data from servers in the Client’s place.
  • Segmented LAN with firewall protection.
  • All ports except DNS and SMTP server are disabled for the external world.
  • Individual domain accounts for each processor ensure that the access to source documents is restricted to authorized employees only.
  • The printing job is screened by an Administrator. Printing rights are not allowed to the customer service agents and there is no access to any printer from the operations area.
  • Access to the operational area is given to a restricted number of trained professionals and only members of the identified processes have access to the same.
  • PCs used by processors do not have floppy/USB and CD ROM drives.
  • E-mail access is restricted to the intranet. Incoming and outgoing emails are constantly screened by the Data Security Administrator.
  • Regular updating of anti-virus software.
  • Restricted usage of pen, pencil, and papers in the processing area, and Team Leaders make sure that no data leakage from the processing area.

Procedure for Sorting Password and other Confidential Information

Our Chief Executive Officer shall review and approve ownership of Information Resources and their associated responsibilities.

Our Network Administrator:
Monitor access to the resources to maintain security, operational, and privacy requirements. He is responsible to take all reasonable measures to protect Information Resources, which may include blocking, suspending, or revoking access from sources that pose an immediate threat of harm or interfere with normal operations.

PROCEDURES FOR PASSWORDS

All passwords shall be constructed and implemented according to the following criteria:

  • Servers that are mission-critical and/or maintain confidential information shall have passwords.
  • Passwords must be treated as confidential information. Passwords shall only be revealed to Senior personnel and by the end-user/system owner.
  • Passwords shall be routinely changed (no longer than 90-day intervals for systems processing/storing mission-critical and/or confidential data).
  • Passwords shall never be transmitted as plain text.
  • If the security of a password is in doubt, the password shall be changed immediately. If the password has been compromised, the event shall also be reported to the appropriate system administrator(s).
  • Computing devices shall not be left unattended without enabling a password-protected screensaver or logging off the device.
  • Forgotten passwords shall be replaced, not reissued.

Website blocking

The system administrator decides which websites will be visible to the user and bookmark websites for use and hide passwords.

Virus Scanning

All messages are scanned for viruses.

We are continuously improving the security system and presently implementing additional security and operational features like automatic maintenance of usage logs to track usage, monitor system health, Auto collection of email addresses, and auto-mail backup archive with access controls.

About us

TAMIA CONSULTING ADVISORS PRIVATE LTD (TCA) is a team of Indian Chartered Accountants and  Accounting professionals who got immense knowledge in US accounting and International accounting. We provide integrated cost-effective offshore financial, accounting, and tax services to Certified Public Accountants, individuals as well as small and medium-sized companies around the world at an affordable fee and add value to their business.

Our contacts

Door No 71/707c KRS ONEAthanikkal,West Hill, KozhikodeKerala673005
Phone: 202-360-4426Email: help@tamiaca.com

Socials

Accounting Software

  • QUICKBOOKS (Online, Pro, Premier, Accountant, Enterprise, MAC versions,POS)
  • PEACHTREE,FRESHBOOKS
  • SAGE 50 ACCOUNTING(Desktop and Sage one Online)
  • QUICKEN,FRESHBOOKS
  • BUILDIUM, NETSUITE,YARDI
  • CREATIVE SOLUTIONS,XERO
  • IRIS,KASHOO

Tax Software

  • LACERETE
  • PROSERIES
  • INTUIT PROCONNECT
  • ULTRA TAX
  • TURBO TAX
  • PROSYSTEM FX
  • ATX.CCH

CONTACT

Tamia Consulting Advisors (Pvt) Ltd. Door No 71/707c KRS ONE , 1st Floor, Athanikkal, West Hill Kozhikode, Kerala 673005,India Suresh Kumar Phone-919342867095 Email: billing@tamiaca.com help@tamiaca.com suresh@tamiaca.com
Tamia Consulting Advisors Tamia Consulting Advisors
  • Home
  • About
  • Contacts
  • Blog Standard
  • Services
  • Terms & conditions
Privacy Policy | TCA © 2021 / ALL RIGHTS RESERVED
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT