FIXED ASSETS MANAGEMENT SOLUTION
FIXED ASSETS AUDIT AND MANAGEMENT SOLUTION [ FAAMS ] OBJECTIVE To built a systematic, organized controlled environment on the assets, where assets are critical and capital intensive to organization
FIXED ASSETS AUDIT AND MANAGEMENT SOLUTION [ FAAMS ] Highlights 1. Complete life cycle of assets from procurement to Disposal 2. Assets operation tree and location transfer and tracking info 3. Approval and work flow management of assets cycle 4. Inventory management of unused assets or scrap assets 5. Management and Scheduling of repair and maintenance and cost,material,labor,inventory and tracking management 6. Assets mapping facility. 7. Any point and any location access through web 8. Auto generate bar / QR code 9. Search assets through 2D mapping tool.
About the Software Life cycle of assets Procurement Requisition Approval of requisition Cost comparison of vendor Purchase order creation and sending Items received Assets location management Multi layer assets class and grouping and tree Multi discipline assets grouping view Assets inter transfer within location /outlet
About the Software Assets Inventory New assets addition goes to inventory Scrap assets goes to inventory Any equipment, parts for repair in inventory No. of actual and require and warning level Instant creation of order and vendor analysis - Vendor / service provider management - Insurance of assets management - Custodian assets management
About the Software - Assets Repair and maintenance Management - Schedule maintenance - Emergency repair maintenance - Repair equipment and parts management - Repair costing and planning - Repair scheduling and planning - Disposal assets management - Depreciation and impairment - Map Based assets management tool
A case studies Mnc company -OSI (Macdonald food chain,frozen food manufacturing set up ) After lot of research, this application has been developed to resolve this issues in Fixed Assets management like uncontrolled asset transfer, assets scrapped etc which is not updated in the actual fixed assets register. By this application, the physical asset can be checked, verified at anytime,and very auditor friendly. Even,a auto check method has been embedded within the system,the assets can be controlled internally as well as externally. Usually, movable assets get displaced from original location and later become non traceable. In the present software, each assets are marked with location in the map like Google map. By pointing your mouse on the map, you will find assets details and click further it will lead details assets info, cost info and regular maintenance info. Its basically designed on drill down method. Every assets should be tagged as well as grouped with the responsibility and ownership. So the effectiveness of maintenance cost and optimization assets maintenance can be achieved. This object has been embedded with this system. Further, whenever,management gets requisition for repair, replace, sell, obsolete a particular asset, it is always advisable, the history of assets with all updated maintenance record should be part of requisition. But, it usually consumes time to gather data on related assets, and management take decision relying on the present information. To meet this challenge, every assets are traceable with history record and regular maintenance record with no time, where management can take optimized decision So, the whole asset are within the grip of management with control at all times.
Map Based Assets Tracking Lay out of the factory,over view
Map Based Assets Tracking Lay out of the particular section, overview
Map Based Assets Tracking Assets details of particular assets,over view
Map Based Assets Tracking Cost details of particular assets,over view
Map Based Assets Tracking Report
Map Based Assets Tracking Report Master Report Addition of Assets current Year Report Major expenses on Assets Report Depreciation Report Each Assets Maintenance Report
Map Based Assets Tracking Assets Report
Map Based Assets Tracking Assets Addition in current Year Report
Map Based Assets Tracking Assets Related Expenses in current Year Report
Map Based Assets Tracking Master Report
Map Based Assets Tracking With Qrcode Tags
Security Policy Of FAAM 1. Network Security ::Total SSL support would mean all the data transfer between the end user and server is encrypted with respective SSL certificate. Private Apps cannot be accessed by other people, nor indexed by search engines or robots, regardless of your account level. 2. User Security :: All the parts of the app receives permissions assigned in the database. The permission system has an elaborate privilege-role based security system giving admin almost all controls over the apps' permission system. Even users/ip/domains may be blacklisted or whitelisted. IP Locking/GeoIP Locking can be provided on demand. You may revoke permissions or revert your app to private at any time. MultiLevel User Privilege and control apps increases overall security. 3. Application Security :: We use widely-used and secure password and login techniques to validate access to our service. The application determines access privileges and allowes the user to use only the assigned tasks and links. For further security, Admin can set permissions so that some users may view specific parts reports/forms/pages/views while restrictive to others.
Security Policy Of FAAM 1. Data Security :: Custom backup policies of the company can be used to backup your data on daily, weekly and bi-weekly rotations at multiple off site locations to safeguard against an unforeseeable catastrophe. All actions on the app are recorded in the app history and can be reviewed in the history/log reports. Thanks to this feature, a complete audit trail is created, allowing admin to pinpoint who did what and when (Action Log) on any given point of time(on Demand). 2. Privacy Policy :: The company may implement its own Privacy Policy. 3. Regular Updates :: Regular updates and security patches from us keeps your system safe and updated to the latest technologies and the security patches confirm that your data and remains safe.