At AccountingDepartment.com, we can assure you that your business' most crucial information is maintained in a secure virtual accounting environment. Our detailed process to maintain strict security is based on accounting best practices, which we implement throughout our accounting services.
To give you better understanding of virtual accounting best practices we put into place to maintain a secure environment for your data, we've mapped out our data back-up procedures, insurance coverage and the specs of the data center facililty.
To review the original source: https://cloud.xcentric.com/xc/cms/policies/security
Right Networks Cloud security is designed to meet the strict security and privacy standards that the accounting industry must adhere to – for today and beyond. With the ever-changing security risks that are present when transacting business online, it’s understandable if you have concerns about keeping your data safe. Because your firm has chosen Right Networks products and services to serve your technology hosting needs, you can be assured that your software and data are in one of the most secure locations available—the Quality Technology Services SOC audited Data Center.
Comprised of facilities totaling more than 376,000 square feet, it is one of the most advanced and secure data centers in the world. Every precaution is taken to guarantee the safety of your data. Equipment and facilities are protected against fire, natural disasters, power failures, and other unexpected scenarios. Quality Technology Services currently operates 11 data centers across the United States.
Right Networks’ information technology control system was designed with the assumption that certain controls will be implemented by user entities. In certain situations, the application of specific controls at user entities is necessary to achieve certain control objectives. This section describes additional controls that should be in operation at user entities to complement the controls within Right Networks’ description of its information technology general control system. Each user entity must evaluate its own internal control structure to determine if the identified complementary user entity controls are relevant and/or have been placed in operation. This list of user entity controls should not be regarded as a comprehensive list of all controls which should be employed by user entities. There may be additional controls not identified in this report that would be appropriate for the processing of user transactions. Complementary user entity controls that should be considered by user entities and their independent auditors include those listed below:
The following activities constitute unacceptable use of the Right Networks Cloud network and are prohibited.
The following backup policies are implemented by Right Networks to protect client data including file share (network drives), and SQL server (databases) data.
Right Networks performs backups of File Share data (S, T, O, U, Q drives) on the following basis:
The File Share hourly and daily backups are incremental, including changes since the last backup.
Right Networks performs backups of SQL server data (database) on the following basis:
The SQL weekly, monthly, and annual backups are full, snapshot backups which do not include changes that occurred between backups.
Requests to restore data from backup may take up to 5 business days to complete.
Permalink for this article: https://cloud.xcentric.com/xc/user/learn/kb?documentId=bkp1vau19ltgos4tvb90
At AccountingDepartment.com, we want to assure to you that your business' most crucial information is maintained in a secure virtual accounting environment. Our detailed process to maintain strict security is based on accounting best practices, which we implement throughout or accounting services.