Being SOC 1 audited, our circle of technology, workflow, and experienced staff can provide a level of security and complete services that are not practical for a small office environment wanting separation of duties with limited personnel. Leave the heavy lifting to us. Let us manage the workflow, software, timelines and people because that is what we do.
Financial Administration includes:
Mail Administration and Collection
Scanning and Document Management
Trust Accounting and Bill Pay
Personal Bill Pay
Bank Statement Reconciling
Credit Card Categorization
Ultra High Net Worth Accounting Services and Bookkeeping
Estate Planning Administration
Foundation Accounting and Bookkeeping
Private Foundation Administration
Personal Financial Administration
Virtual Wealth Administration
Online File Room and Cloud Accounting Administration
Personal Partnership or Trust Back-Office Administration
All of your accounting documents would be backed up every night in multiple data locations (Northern Virginia and Dallas) and accessible via secured online portal.
- SOC 1 (SAS70, SSAE16), SOC 2 and SOC 3 – Service Organization Controls (SOC) standards are a series of accounting standards that measure the control of financial information for a provider. These standards are non-industry specific and deal with the physical controls (SOC 1), virtual security, data protection and procedures (SOC 2) and executive level summary of both levels (SOC 3).
- SOX – Required for publicly traded companies, Sarbanes Oxley Act (SOX) legislates enhanced regulations for financial practices and corporate governance.
- HIPAA – Critical compliance for healthcare and many public sector industries, the Health Insurance Portability and Accountability Act (HIPAA) regulates national standards for maintaining personal information privacy and data handling.
- PCI – Essential for any company that processes credit card information, the Payment Card Industry (PCI) Data Security Standard is designed to ensure that all companies process, store and transmit credit card information securely.
- ITAR – Critical for public sector organizations, the International Traffic in Arms Regulations (ITAR) standard restricts information that can be accessed by non-US citizens, specific types of technology and associated data.
- FIPS 140-2 – Required in some public sector industries, especially defense, the Federal Information Processing Standard (FIPS) Publication sets levels of encryption to cover a wide range of potential applications and environments.
- Safe Harbor – Required for many multi-national companies, the U.S.-EU Safe Harbor Framework compliance process addresses European Union laws on the protection of personal data.