|Meeting the challenges in Data Entry and Forms Processing|
|Data Entry Services | Data Entry Quality | Project Turnaround | Data Security | Profile | Employment | Contact | Home|
Security for Data Entry Projects and Forms Processing
Client original source documents are never distributed to data entry operators. All documents are first scanned using high-speed document scanners. Data is then either extracted using text recognition methodologies or is keyed from scanned image. Neither hard copy documents nor images every leave our facility, even if we are using offshore operators. When required, we utilize the services of a certified document destruction firm to dispose of client source documents, thus further insuring documents do not fall into the wrong hands.
The bulk of our keying and/or text verification is performed from image over a private network. We use a thin client model, which means that all work is done on the central servers. NOTHING ever leaves our servers. Images, data, and all processing stay on the central servers. Data entry operators do not have the access to hard copy documents, and cannot print or download images or data.
Backup and disaster recovery are administered through the use of a sophisticated network attached device (BDR), which integrates two technologies to provide point in time / bare metal backup and restore capability, as well as virtualization of backed up servers in order to keep downtime to a minimum.
The “bare metal” backup of the BDR agent allows for the backup of files which are open or in use. Backups of Axion’s servers are done via the BDR agent every 15 minutes. They are stored on the BDR unit in the event that a restore or virtualization would need to be done. Starting at midnight each night, the BDR unit transfers the day’s backup files to two different data centers, one located in San Diego, and the other located in Baltimore. These files are encrypted and are checked to ensure that the data received is restorable. The offsite data center staff does not, at any time, have access to the data contained in the backup images.
The bare metal nature of the restore process would allow us to restore an entire server to the samehardware configuration, or to different hardware of similar spec, if needed. In the event that a server cannot be restored, all network activity can be shifted to the BDR and backup files restored within one hour of commencing recovery procedures. The BDR then serves as Axion’s network until the disabled server can be repaired or replaced.
As mentioned above, source documents are not distributed to data entry operators, nor can they print or download images. As an added measure, when privacy requirements demand it, we can "split" the image and have different parts of the document keyed by different data entry operators. Thus, a single data entry operator would never have access to an entire document. For example, one group of operators can be assigned to enter just applicant names, another can be assigned the social security numbers, dates and telephone numbers, and a third group can be assigned everything else. In addition, we utilize the services of a certified document destruction firm to dispose of client source documents when required.
As discussed above, nothing ever leaves our servers and we can have different data entry operators process different parts of each document, thus making it impossible for any one person to have access to all the information on a single document. Furthermore, our data entry contractors work independently from remote locations, typically do not know each other, and do not have the ability to communicate or exchange information. This combination of factors results in even better security and confidentiality than can be achieved when operators work next to each other in a centralized data center.
Other possible areas of interest:
|1-800-493-2630||Services | Quality | Turnaround | Security | Profile | Employment | Contact | Home | Site Map | Resources
©2004 Axion Data, Inc. All rights reserved.