FIXED ASSETS MANAGEMENT SOLUTION



Similar documents
Cybersecurity Health Check At A Glance

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Set Up Instructions

Mobile Device Management Solution Hexnode MDM

Client Security Risk Assessment Questionnaire

Copyright Telerad Tech RADSpa. HIPAA Compliance

Network and Security Controls

SUMMIT ASSET MANAGEMENT DATASHEET

SapphireIMS 4.0 Asset Management Feature Specification

Catapult PCI Compliance

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

WHY FIXED ASSET TRACKING FEATURES AND BENEFITS WHO USES FIXED ASSET TRACKING

Kony Mobile Application Management (MAM)

Cloud Services MDM. ios User Guide

BROCHURE. KenCloud TM Asset Management System. Brochure- KenCloud TM AMS. Swash Convergence Technologies Limited

Product Comparison List

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Two-Factor Authentication

Management of Assets Policy

DATA PRIVACY AND SECURITY ANALYSIS

Introduction to Google Apps for Business Integration

HIPAA Security COMPLIANCE Checklist For Employers

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Best Practices for PCI DSS V3.0 Network Security Compliance

Corporate Property Automated Information System CPAIS. Privacy Impact Assessment

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Newcastle University Information Security Procedures Version 3

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

CRESTRON-APP-ANDROID Control App for Android

Hong Kong Baptist University

U.S. Cellular Mobile Data Security. User Guide Version 00.01

Securing Data in Oracle Database 12c

Neat Cloud Service + Mobile App

Insight Student for Chromebooks - Auto Configuration

Employee Management Certification Exam. P130 Employee Management: Basic

IDT Financial Services Limited. Prime Card Privacy Policy

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

ONLINE PRIVACY POLICY

Information Technology General Controls (ITGCs) 101

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Vodafone Hosted Services. Getting your . User guide

Tenable for CyberArk

Management of Assets Procedure

Type of Personal Data We Collect and How We Use It

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used?

Sonian Getting Started Guide October 2008

DEVELOP ROBOTS DEVELOPROBOTS. We Innovate Your Business

Application Testing: Not Just for IT Auditors. Insert Logo Here

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

Xopero Backup Build your private cloud backup environment. Getting started

UNIVERSITY EQUIPMENT

tell you about products and services and provide information to our third party marketing partners, subject to this policy;

Credit Card Security

Quick DDNS Quick Start Guide

Group Management Server User Guide

activecho Frequently Asked Questions

Website Privacy Policy Statement York Rd Lutherville, MD We may be reached via at

Android App for SAP Business One. Z3moB1le App Version 1.00 Pagina 1 di 12.

Installing the software

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

Management, Logging and Troubleshooting

CHIS, Inc. Privacy General Guidelines

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Welcome to ncrypted Cloud!

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Qvidian Playbooks & Salesforce Setup Guide. Fall Release 2013

ShareFile Security Overview

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015

Information Resources Security Guidelines

Central Agency for Information Technology

Paladin Computers Privacy Policy Last Updated on April 26, 2006

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

Frequently Asked Questions For Investors

Louisiana State University Property Management Procedures

Website Privacy Policy Statement

MSSTAN 1504: Supplier Security Requirements and Expectations (SSRE) Web Applications For Externally Facing (Public) Data

Data Protection: From PKI to Virtualization & Cloud

Dashboard Admin Guide

Circular to All Licensed Corporations on Information Technology Management

Getting Started with Clearlogin A Guide for Administrators V1.01

Quick DDNS Quick Start Guide

Introduction to Endpoint Security

Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

Cyber Essentials Questionnaire

How To Use Econnect On A Pc Or Mac Or Ipad (For A Non Profit)

Transcription:

FIXED ASSETS MANAGEMENT SOLUTION

FIXED ASSETS AUDIT AND MANAGEMENT SOLUTION [ FAAMS ] OBJECTIVE To built a systematic, organized controlled environment on the assets, where assets are critical and capital intensive to organization

FIXED ASSETS AUDIT AND MANAGEMENT SOLUTION [ FAAMS ] Highlights 1. Complete life cycle of assets from procurement to Disposal 2. Assets operation tree and location transfer and tracking info 3. Approval and work flow management of assets cycle 4. Inventory management of unused assets or scrap assets 5. Management and Scheduling of repair and maintenance and cost,material,labor,inventory and tracking management 6. Assets mapping facility. 7. Any point and any location access through web 8. Auto generate bar / QR code 9. Search assets through 2D mapping tool.

About the Software Life cycle of assets Procurement Requisition Approval of requisition Cost comparison of vendor Purchase order creation and sending Items received Assets location management Multi layer assets class and grouping and tree Multi discipline assets grouping view Assets inter transfer within location /outlet

About the Software Assets Inventory New assets addition goes to inventory Scrap assets goes to inventory Any equipment, parts for repair in inventory No. of actual and require and warning level Instant creation of order and vendor analysis - Vendor / service provider management - Insurance of assets management - Custodian assets management

About the Software - Assets Repair and maintenance Management - Schedule maintenance - Emergency repair maintenance - Repair equipment and parts management - Repair costing and planning - Repair scheduling and planning - Disposal assets management - Depreciation and impairment - Map Based assets management tool

A case studies Mnc company -OSI (Macdonald food chain,frozen food manufacturing set up ) After lot of research, this application has been developed to resolve this issues in Fixed Assets management like uncontrolled asset transfer, assets scrapped etc which is not updated in the actual fixed assets register. By this application, the physical asset can be checked, verified at anytime,and very auditor friendly. Even,a auto check method has been embedded within the system,the assets can be controlled internally as well as externally. Usually, movable assets get displaced from original location and later become non traceable. In the present software, each assets are marked with location in the map like Google map. By pointing your mouse on the map, you will find assets details and click further it will lead details assets info, cost info and regular maintenance info. Its basically designed on drill down method. Every assets should be tagged as well as grouped with the responsibility and ownership. So the effectiveness of maintenance cost and optimization assets maintenance can be achieved. This object has been embedded with this system. Further, whenever,management gets requisition for repair, replace, sell, obsolete a particular asset, it is always advisable, the history of assets with all updated maintenance record should be part of requisition. But, it usually consumes time to gather data on related assets, and management take decision relying on the present information. To meet this challenge, every assets are traceable with history record and regular maintenance record with no time, where management can take optimized decision So, the whole asset are within the grip of management with control at all times.

Map Based Assets Tracking Lay out of the factory,over view

Map Based Assets Tracking Lay out of the particular section, overview

Map Based Assets Tracking Assets details of particular assets,over view

Map Based Assets Tracking Cost details of particular assets,over view

Map Based Assets Tracking Report

Map Based Assets Tracking Report Master Report Addition of Assets current Year Report Major expenses on Assets Report Depreciation Report Each Assets Maintenance Report

Map Based Assets Tracking Assets Report

Map Based Assets Tracking Assets Addition in current Year Report

Map Based Assets Tracking Assets Related Expenses in current Year Report

Map Based Assets Tracking Master Report

Map Based Assets Tracking With Qrcode Tags

Security Policy Of FAAM 1. Network Security ::Total SSL support would mean all the data transfer between the end user and server is encrypted with respective SSL certificate. Private Apps cannot be accessed by other people, nor indexed by search engines or robots, regardless of your account level. 2. User Security :: All the parts of the app receives permissions assigned in the database. The permission system has an elaborate privilege-role based security system giving admin almost all controls over the apps' permission system. Even users/ip/domains may be blacklisted or whitelisted. IP Locking/GeoIP Locking can be provided on demand. You may revoke permissions or revert your app to private at any time. MultiLevel User Privilege and control apps increases overall security. 3. Application Security :: We use widely-used and secure password and login techniques to validate access to our service. The application determines access privileges and allowes the user to use only the assigned tasks and links. For further security, Admin can set permissions so that some users may view specific parts reports/forms/pages/views while restrictive to others.

Security Policy Of FAAM 1. Data Security :: Custom backup policies of the company can be used to backup your data on daily, weekly and bi-weekly rotations at multiple off site locations to safeguard against an unforeseeable catastrophe. All actions on the app are recorded in the app history and can be reviewed in the history/log reports. Thanks to this feature, a complete audit trail is created, allowing admin to pinpoint who did what and when (Action Log) on any given point of time(on Demand). 2. Privacy Policy :: The company may implement its own Privacy Policy. 3. Regular Updates :: Regular updates and security patches from us keeps your system safe and updated to the latest technologies and the security patches confirm that your data and remains safe.