top of page

Ad Hoc Model

Under this model, actual usage is metered and you pay only as much capacity as you use. You would get skilled dedicated staff working exclusively on your tasks. This model works for those who don’t know exactly how much work they have to outsource. It can be a good starting point to get a taste of outsourcing and understanding how much workload you can outsource before committing full time.

The Part/Full-Time Model

Under this model, you can hire virtual employee on fixed hours basis for part/full time based upon your requirements. This model offers greater control as you plan and manage the work and you get a dedicated manager who reports directly to you. Benefits of this model includes one to one communication, availability of extra hours at fixed cost, ability to build up duties and responsibilities and potential to develop back office team.

Virtual Team Model

This is an extension of Full-Time Model for those companies who wish to build  whole back office team with us. Under this model, your entire team could be set up here virtually to provide you all the required services efficiently and with expertise.

Other things that concern you.

How we access your data?

The growth of cloud accounting software has made it really easy to share info/data these days. All that need is to decide the mode of sharing:

  1. Remote Desktop System: Under this method we can connect to the client’s computer system using remote desktop access services like  Windows Remote Desktop, Gotomypc.com, LogMein connection to work  on the accounting and practice manager software installed at the client’s computer and also access  the files and folders we have been authorized to.

  2. Online Software:-In this method, accounting software are cloud based. We can Log in to the accounting software with help of ID and Passwords provided to us and could access those modules we have been authorized to.

  3. Offline Accounting File:  Under this method, the accountant works on the Backup copy of  the accounting file, update the file and send back to the client in turn replaces the updated file with current accounting file.

Data Privacy

We at ICNIPL understand the importance of maintaining the confidentiality and security of our client’s data.

    1.    Meaning and collection of Information:

"Personal Data" means any data relating to a Data Subject which is capable of identifying such Data Subject directly or indirectly such as name, an identification number, location data, an online identifier or one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that Data Subject. Personal Data will include Sensitive Personal Information and Special Categories of Personal Information unless otherwise stated. We will strive to ensure that Personal Data collected by us is adequate, relevant and limited to what is necessary in relation to the intended purpose.

We or any person or entity duly authorized on our behalf may collect a variety of Personal Data as required by us to fulfill our responsibilities and obligations as an employer, associate, client or service provider. Such Personal Data may be collected or received by us when you interact with us on our website, e-mail, mobile apps or other web-based applications or by way of personal, telephonic or audio-visual meetings or when you provide to us any documents containing your Personal Information. The Personal Data collected by us could include one or more of the following we are provided:

  •  Name, Address, DOB and contact details

  • ABN, ACN, TFN and employment details

  • Personal health and insurance details

  • Financial Information-such as income, expense, superannuation and investments details.

 

    2.   Use of personal data and its disclosure:

The collection and use of personal information is only to facilitate the services we provide. ICNIPL provide the information to their staff that relates specifically to the tasks requested by client.

 

    3.   ​Security practices and controls:

We at ICNIPL take all reasonable steps to ensure that client’s personal data is stored in a secure environment and protected from unauthorized access, modification or disclosure.We strive to keep the Personal Data secure through implementation of the security practices and controls. Personal Data is stored using systems which have restricted access and which are housed in facilities with physical security measures. We have a comprehensive information security program documented in the form of our Information Security Policy. Internet activity is heavily controlled with websites required to be added to a “white list” before they can be accessed. Staff are unable to access personal emails from the office and work emails are unable to send data outside the office. Our intranet, internal portals, software and sites have IP Authentication in place so that no one can access these records outside our office premises. Access to our internal software is password protected with strength measurement. Passwords are also required to be updated on a regular basis. All terminals include screen snapshots and are regularly audited to ensure staff are following security guidelines.

bottom of page