Axion Data Entry Services Meeting the challenges in Data Entry and Forms Processing

Security for Data Entry Projects and Forms Processing

Document Security


Client original source documents are never distributed to data entry operators. All documents are first scanned using high-speed document scanners. Data is then either extracted using text recognition methodologies or is keyed from scanned image. Neither hard copy documents nor images every leave our facility, even if we are using offshore operators. When required, we utilize the services of a certified document destruction firm to dispose of client source documents, thus further insuring documents do not fall into the wrong hands.

Data Security


The bulk of our keying and/or text verification is performed from image over a private network. We use a thin client model, which means that all work is done on the central servers. NOTHING ever leaves our servers. Images, data, and all processing stay on the central servers. Data entry operators do not have the access to hard copy documents, and cannot print or download images or data.

Disaster Recovery


Backup and disaster recovery are administered through the use of a sophisticated network attached device (BDR), which integrates two technologies to provide point in time / bare metal backup and restore capability, as well as virtualization of backed up servers in order to keep downtime to a minimum. 

The “bare metal” backup of the BDR agent allows for the backup of files which are open or in use. Backups of Axion’s servers are done via the BDR agent every 15 minutes.  They are stored on the BDR unit in the event that a restore or virtualization would need to be done.  Starting at midnight each night, the BDR unit transfers the day’s backup files to two different data centers, one located in San Diego, and the other located in Baltimore.  These files are encrypted and are checked to ensure that the data received is restorable.  The offsite data center staff does not, at any time, have access to the data contained in the backup images. 

The bare metal nature of the restore process would allow us to restore an entire server to the same

hardware configuration, or to different hardware of similar spec, if needed.  In the event that a server cannot be restored, all network activity can be shifted to the BDR and backup files restored within one hour of commencing recovery procedures.  The BDR then serves as Axion’s network until the disabled server can be repaired or replaced.

Privacy


As mentioned above, source documents are not distributed to data entry operators, nor can they print or download images. As an added measure, when privacy requirements demand it, we can "split" the image and have different parts of the document keyed by different data entry operators. Thus, a single data entry operator would never have access to an entire document. For example, one group of operators can be assigned to enter just applicant names, another can be assigned the social security numbers, dates and telephone numbers, and a third group can be assigned everything else.  In addition, we utilize the services of a certified document destruction firm to dispose of client source documents when required.

Confidentiality


As discussed above, nothing ever leaves our servers and we can have different data entry operators process different parts of each document, thus making it impossible for any one person to have access to all the information on a single document. Furthermore, our data entry contractors work independently from remote locations, typically do not know each other, and do not have the ability to communicate or exchange information. This combination of factors results in even better security and confidentiality than can be achieved when operators work next to each other in a centralized data center.

Axion is here for you.
We take pride
when you succeed.

Let's discuss how we can work together:

1-800-493-2630
- or -

Email Us

 

Other possible areas of interest:

Project Turnaround
When it comes to implementing and completing our clients' data entry projects, Axion's services are done expeditiously and precisely.

 


 

Data Quality
Making sure the data entered for each and every project is accurate and complete is Axion's top priority. Re-key verification and field validation are just two examples which Axion uses in maintaining quality in data entry. Find out more about Axion's data quality.

 

1-800-493-2630

2014 latest 200-101 dumps bally handbags victoria beckham replica prada other handbags outlet replica louis vuitton monogram vernis handbags