Resource • Data Security
Data Security & Access Policy
Finance and compliance data is sensitive. We follow controlled sharing and an audit-friendly folder structure. Exact access method is agreed during onboarding.
How we handle access
- Prefer controlled access: role-based user IDs, limited permissions, and audit trails (where platform supports)
- Where credentials are needed, we recommend client-managed password sharing methods and periodic resets
- We never ask for unnecessary permissions - only what is required for the scope
How we handle documents
- Month-wise folder structure: inputs → working → outputs
- Evidence folders for reconciliations and notices
- Version control style naming to avoid confusion
- Data retention and deletion can be agreed based on contract
Professional standard: Every filing has a supporting working file. This protects you in audits and reduces dependency risk.