Data Security

Data Security Measures at Rayvat Accounting

We at Rayvat Ensure that the Client’s data remains completely confidential with us. Data Security is at the helm of our affairs, and of clients, the security of clients very seriously. Here are some of the measures which we have for ensuring data security.

Some of the measures are forward-looking measures, which we plan to implement at various scales of operations.

1. NonDisclosuree Agreement (NDA)

  • Non-Disclosure Agreement has to be signed by every Employee.
  • The NDA would ensure that the data does not leak by the employees.
  • It would make Employees Legally Liable for wrong done.

2. Employee Selection and Screening:

  •  Background Checks would be performed before selecting an employee to ensure his integrity.

3. Login only through authorized IP:

  •  Employees would be prevented from logging through other than approved computing devices.
  •  Employees can access records only from the office premises.

4. Fidelity Insurance:

  •  A Company can have fidelity insurance from Wrong done by the employees. However, the cost of the game has to be Bourne by the client.
  •  In India,  many insurers provide such insurance.

Some of the insurers are:

  • National Insurance Co.
  • New India InsurancCoco.
  • Bharti Axa.
  • Tata AIG Insurance.
  • Oriental Insurance.

5. Location of Servers:

  •  The Servers would be located at a remote place.
  •  None of the information would be stored on the local computing device.
  •  The user has to remotely log in to the servers.
  •  The information would be sent to the servers inann updated format.

6. Physical Security:

  •  Employees should be allowed access only after taking a thumbprint. That ensures the physical presence of the person.
  • The work of employees would be monitored with the help of video cameras.
  • Employees would not be allowed to enter with a recording device of any kind.
  •  Employees would not be allowed to use paper and pen to ensure that information is not recorded.
  • Diskless Computers: The computing devices would be diskless to prevent any unauthorized copying of information.

7. Defining the user-level access:

  • User-level access should be defined to ensure that there is no unauthorized use of information.
  • Changing of Passwords at frequent intervals.
  • Access to the data will be discontinued when the data is no longer required.
  • For Egg. Employees should not have access to the previous year’s data of clients.
  •  Use of Information by each of the employees would be recorded.
  •  The “Print” Option would be disabled for the users.

8. Audit of policies:

  • Policies should be strictly followed.
  • The policies would be handed to the employees to ensure that they are aware of the information security policies.
  • Timely review of policies would be done.
  • Timely IS audit would be done to ensure its implementation.
  •  Full-time people should be there for the vigilance of the activities to prevent any wrong.