How we Communicate :
We treat communication integral to outsourcing. We believe that good communication is central to the success of an outsourced project. All our clients work halfway across the globe. They operate in time zones that are vastly different from ours and engage in models that could be different. Having been around for over 9 years, we fully understand the complexities of such an engagement.
That is why we have taken deliberate steps to ensure that communication channels are constantly open and every member on the project is apprised of progress.
Here are a few communications tools and best practices that have stood us in good stead:
VOIP: Real-time conferencing and conversation is an integral part of our communication strategy. We are available for chats and calls on internet messengers or several US phone lines that ring at our India office.
Email: We believe that emails are a great way to be clear on goals and expectations. Often, we recap conversations and decisions on email, so we have a mutual understanding of what needs to be achieved.
Online conference and collaboration tools: For projects that require customer walkthroughs, we use tools like Zoom Meeting an online conferencing software.
Instant messaging tools: We use several IM tools such as Skype, Slack, etc.
Project management tools: Our online project management tool allows you to remain up-to-date on your work. This increases the amount of control you exercise on your progress.
General FAQs :
- Biometric access to work areas
- Locked, active directory-controlled workstations accessible only by authorized users
- NDA signed by all employees
- Dedicated resources for FTE-based accounts to ensure data privacy
- VPN tunnels and firewalls for secure access to the network for authorized senior-level personnel only
- Physical monitoring of all buildings 24 hours a day, seven days a week, including armed night guards for additional security
- Remote CCTV monitoring
- Regular internal audits and facility monitoring
- Restricted work areas — no media, cell phones, or paper allowed in work areas for process associates
- Dual monitors for paperless function
- Detailed time estimates for each of our deliverables
- Build tools and process automation
- Effective back-up to guarantee continuity of critical process
- 90 percent achievement rating for optimal quality
- Five or more hours of training each month for each employee
- 99.5 percent uptime for technical and human systems
- Resolution escalation in 24 working hours or less
- Full transparency and access to all error reports
- Multiple redundant high-speed networks for process continuity
- Backup generators and UPS for process continuity
- NDA and non-solicitation agreements signed between Entelyglobal and clients
- NDA signed by all employees
- Dedicated resources for FTE-based accounts to ensure data privacy
- Email servers with reputed firms like Google and Zoho.
- In-house document managements server located inside our office in Bangalore.
- Dedicated, named resources to ensure data privacy
- Dedicated, named supervisor for high-volume clients
- Named unit manager at the offshore operations site
- Named client relationship manager in the U.S.
- Web-based scanning to our in-house document management system
- Email directly from the scanner or as attachments
- FTP directly from the scanner or via our user interface
- PDF or Excel files
- Instant-messaging services for immediate resolution
- Shared cloud storage space
- Local U.S. numbers for phone or fax communication
Entelyglobals facility and procedures are built to support fast, secure interactions. Our security philosophy is derived from AICPA best practices. Outsourcing and Privacy: 10 Critical Questions Top Management Should Ask AICPA – American Institute of CPAs
The key privacy concerns related to outsourcing are the same for onshore and offshore outsourcing activities. When poor practices are in place in either location and a privacy breach occurs, the results are similar: a loss of consumer trust and potential litigation from the injured party.
The public’s perception is somewhat fed by the media, who tend to treat offshore privacy breaches with more scrutiny and add to the general public’s notion that foreign businesses are more mysterious and largely unknown.
Traditionally, an organization will be best served if it approaches privacy management from a best practices approach. Using good privacy practices provides a consistent approach to protecting personal information in a way that individuals can easily understand. Solid privacy practices also establish a benchmark for organizations of all sizes across all industry sectors.
An organization that wants to manage its privacy risk and implement a best practices approach to outsourcing should consider the following critical questions:
- Who are the outsourcing organizations we contract with and where are they located?
- Precisely what data are we sending to, and receiving from, outsourcing organizations?
- Is the data “personal information,” and have we given notice to our customers of this data transfer?
- What are our exposures if the data (both sent and received) is improperly accessed, used or maintained?
- What data protection clauses do we have in these contracts?
- What evidence do we have that these outsourcing organizations protect our data as outlined in these data protection clauses?
- What processes are in place to monitor the outsourcing organizations?
- Do these organizations outsource any of their processes in which our data may be further transferred to another organization?
- What processes do the outsourcing organizations we contract with use to verify the data protection practices followed by their outsourcing partners?
- What are the applicable privacy laws and regulations?