(914) 304 4262 GetSupport@GraphXSys.com
(914) 304 4262 GetSupport@GraphXSys.com
If your question isn’t answered here, please contact us. We’re happy to address any concerns you might have.
To ensure the safety of your data at all times, we employ several layers of physical and digital security measures, in our buildings and in our servers.
We do provide discounts depending upon the volume and scope of work. This can be discussed after analyzing the needs of your company and the resources required to serve those needs.
GraphX will have a dedicated team of professionals working on your account—TAT for routine work is 24 hours or less. For any urgent needs, the TAT will be five hours or less if requested between 9:00 a.m. and 5:00 p.m. local U.S. time. The initial on-boarding period will be 30 days or less.
Maintaining high standards and quality of work is of utmost importance for a successful client relationship. We have several measures in place to ensure that high quality.
In addition to our physical and digital security measures, Back Office Center keeps client data fully confidential.
GraphX has a multi-level escalation path.
Our response time is 4 hours or less for resolution escalation between 9:00 a.m. and 9:00 p.m. Eastern time. Depending on escalation volume, we also provide resolution times within the client’s working time zones.
We always have about 20 percent of our staff trained and available as backup. Our current facility has a floor with 2,000 square feet of workstation space and can accommodate an additional 150 to 200 employees working in multiple shifts.
We have an in-house hiring team, but we also make use of additional HR resources if the need arises. We hire only college graduates and post-graduates with MBAs and finance degrees. Our supervisors, consultants, and unit managers have CA degrees equivalent to the U.S. CPA certification. We provide a minimum of four weeks’ training to new hires in the area of U.S.-based accounting software systems.
We provide various methods of data transfer to suit the needs of our clients.
We do charge a nominal fee. However, this can be waived depending upon the scope and nature of the work requested.
We do prefer an annual contract. This can be adjusted based on the scope and volume of work.
We stand behind our associates’ quality of work. However, client satisfaction is of utmost importance. If we have to redo any work because of a failure on our part, we don’t charge our client for the additional work.
We have professionals who are experts in QuickBooks, SAP Business One and Microsoft Dynamics.
We support remote connectivity and services for the entire U.S. Our U.S. office is located in New York and can provide local services for the tri-state area.
GraphX’s facility and procedures are built to support fast, secure interactions. Our security philosophy is derived from AICPA best practices.
Outsourcing and Privacy: 10 Critical Questions Top Management Should Ask
AICPA – American Institute of CPAs
The key privacy concerns related to outsourcing are the same for onshore and offshore outsourcing activities. When poor practices are in place in either location and a privacy breach occurs, the results are similar: a loss of consumer trust and potential litigation from the injured party. The public’s perception is somewhat fed by the media, who tend to treat offshore privacy breaches with more scrutiny and add to the general public’s notion that foreign businesses are more mysterious and largely unknown.
Traditionally, an organization will be best served if it approaches privacy management from a best practices approach. Using good privacy practices provides a consistent approach to protecting personal information in a way that individuals can easily understand. Solid privacy practices also establish a benchmark for organizations of all sizes across all industry sectors.
An organization that wants to manage its privacy risk and implement a best practices approach to outsourcing should consider the following critical questions:
The process of answering these ten questions is the starting point to implement a solid outsourcing privacy environment.