We value all our clients. Protecting your confidential information is our topmost priority.
Our entire global team is connected securely to ensure the best work for our clients around the world. As a team, all members must have access to all documents so they can process work, respond to clients needs, and properly support our Tax Goddess Family.
We have a highly secure internal database, multiple backup protocols, HR hiring protocols, Communication Security protocols, etc. as well as a highly trained professional tech team all working in concert to keep your private information secure. We work with top software vendors who provide banking-level security and in many cases HIPAA level compliance.
Rest assured, your confidential data will be safe with Tax Goddess Business Services®, PC.
Sincerely,
Shauna A. Wekherlien, CPA
Tax Goddess, CPA, MTax, CTC, CTS.
Tax Goddess Business Services®, PC.
Tax Goddess acknowledges that the data available for knowledge processing is the sole property of respective customer only and Tax Goddess and its staff and contractors are only custodians to take reasonable care for the same. We have built infrastructure so as to provide the most secure environment to shield the customer information and data from unauthorized use and intrusion attacks.
Below you will find various sections of our security documentation for your review.[/vc_toggle][vc_toggle title=”Data protection policy” css=”.vc_custom_1635383093806{background-color: #ffffff !important;}” el_id=”proto_content”]
The data protection policy of our company represents our commitment to handle our client’s, staff’s and stakeholder’s information with the utmost confidentiality and care.
We ensure by using this policy that we are transparent and fair in collecting, storing and handling information with respect to the individual rights.
This policy will be applicable to all the clients, staff, vendors, job candidates, etc. who provide information to us.
This policy must be followed by the staff of our organizations and the entities covered under this policy will be consultants, partners, contractors, including all other external entities. Our policy generally refers to any person with whom we provide work, collaborate, or they act for us and may need occasional data access
We must obtain and process information as part of our operations. This information includes any information that makes a person identifiable, offline or online, such as names, addresses, usernames and passwords, digital footprints, pictures, numbers for social security, financial data, etc.
This information is collected by our organization in a transparent manner and only in full collaboration with and knowledge of stakeholders. The following rules apply once this information is available to us.
Our data will be:
Our data will not be:
The company has direct obligations towards the data owners in addition to the methods of handling the data. Specifically, we must:
In order to provide data protection we’re committed to the following:
All guidelines outlined in this policy must be followed strictly. Disciplinary and possibly judicial action would result if there was a breach of the data protection guidelines.[/vc_toggle][vc_toggle title=”Policy for Getting Software” css=”.vc_custom_1635383159468{background-color: #ffffff !important;}” el_id=”proto_content”]
This policy includes guidelines required to purchase the software for the organization to make sure that the software used within the organization is relevant, cost-effective, and safe and, where applicable, can integrate with other technology used within the organization. This policy is applicable to software obtained in a hardware package or as the pre-loaded software.
Request for Software
All software including the non-commercial ones (freeware, open-source, etc.) needs to be authorized either by the Company Owner and by the Tech Team before downloading or using it within the organization. All software requests are reviewed through a series of security reviews by our tech team to ensure they meet our minimum safety and security standards.
Purchase of software
This policy will include guidelines to ensure that the software use is appropriate and that it is used efficiently by all the staff within the organization. In accordance with this Policy, all the freeware and the open source software will be used as per the procedures defined for the commercial software.
Software Licensing
Software Installation
All software installation is to be carried out by the Tech team.
If a computer system does not have the original copy of the software installed on it, the software upgrade will not be loaded or installed on that system.
Software Usage
If a staff member needs to use software at home, an evaluation should be carried out in the first instance to provide a staff member with a portable computer. If the software is found compatible to be used on the personal computer of a staff member, then the Owner needs to authorize the purchase of the separate software, if there are copyright restrictions and licensing on the software. If the software is purchased in such circumstances, the organization shall retain the ownership of the software and it shall be registered by the Tech Team in the software register.
The software which are not authorized will not be allowed to be used within the Organization. This will even include the software that has been owned by an organization’s staff and wanted to use it within the Organization.
It is prohibited to purchase or use the unauthorized copies of the software. Any staff member who purchases or uses unauthorized software shall be referred for further consultation to the owner. Any unlawful software duplication or other copyrighted works shall not be condoned by the Organization and a disciplinary action, if such an event occurs shall be taken by the Owner/VP of Operations/Tech Team.
If a staff member will breach this policy, he/she will be referred for further consultation to the owner.
If any staff member inside and organization is aware of a breach under this policy with respect to the use of the software, then he/she should inform the Owner/VP of Operations/Tech team immediately for further actions. If in case the Owner/VP of Operations/Tech team determines that a staff member who was aware of the breach failed to report it to the management then that staff member shall be referred for further consultation to the owner.[/vc_toggle][vc_toggle title=”Information Technology Administration Policy” css=”.vc_custom_1635383317152{background-color: #ffffff !important;}” el_id=”proto_content”]
This policy includes guidelines for the management of IT assets and resources within the organization.
This policy holds the guidelines that will be responsible for all the emergency management of the information technology within the Organization.
IT Hardware Failure
If any of the hardware inside the organization fails, then the concern should be immediately reported to the Owner/Tech Team.
Virus or other security breaches
The actions listed below must be taken immediately if the information technology of the organization is breached in any case:
This policy provides guidelines on the security of sensitive or limited data storage within the organization.
The Remote Desktop session of the organization runs on an encrypted channel. The following actions and measures are taken by the Tech Team:
Passwords are the most important aspect when it comes to computer security. All the staff of the Tax Goddess Business Services®, PC (including contractors and suppliers with access to Tax Goddess Business Services®, PC systems) are responsible for selecting and securing their passwords, using the appropriate steps as described below.
This policy is designed to set the standard for strong password generation, password protection and frequency of change. Below are the guidelines:
Any staff member who will be found breaching the policy will be subject to disciplinary action that can go up to an extent of termination of the employment.[/vc_toggle][vc_toggle title=”Data security in transit:” el_class=”secug_content” css=”.vc_custom_1635104907625{background-color: #ffffff !important;}” el_id=”proto_content”]
JotForm.com
We use JotForm to provide you with a secure facility on our website to upload your files to us. These files are transferred between your web browser and our private Jotform repository via a secure encrypted connection (SSL). More information about JotForm’s security can be found here.
Document Storage
We use secured cloud storage for our clients’ files.
Slack
It Facilitates communication in the workplace. Helps teams communicate collaborate across remote distances. Enables and encourages the sharing of documents, images and other assets across teams. We use Slack to:
More information about Slack’s security can be found Here.[/vc_toggle][vc_column_text css=”.vc_custom_1635384319236{margin-bottom: 30px !important;}”]We apply the following Human Resources measures to add additional data security and privacy:[/vc_column_text][vc_toggle title=”Staff and Vendor Recruitment and Selection Policy” css=”.vc_custom_1635384198283{background-color: #ffffff !important;}” el_id=”proto_content”]
Tax Goddess is committed to employing the best-qualified candidates while engaging in recruitment and selection practices that comply with all applicable employment laws. It is the policy of Tax Goddess to provide equal employment opportunities to all applicants and employees.
Authorization from the Human Resources Manager and the CEO/COO is required to initiate any action for an open position, including recruitment expenditures, advertising, interviewing and offers of employment.
Upon the selection of the final candidate, the HR department will collaborate to develop an appropriate offer of employment (including position title, compensation, etc.).
A verbal and written offer of employment will be extended by the HR department to the selected candidate. To protect both the client and the company, the HR team will draft a comprehensive employment agreement and legal contract regarding the offer which includes significant restrictions and requirements related to client and data security. Hiring for any position within Tax Goddess is dependent upon the successful completion of required security, credit, police / legal, personal references, and other required background checks.[/vc_toggle][vc_toggle title=”Background Investigations and Reference Checks” css=”.vc_custom_1635539240108{background-color: #ffffff !important;}” el_id=”proto_content”]
Apart from us securing your information using our well-invested technological advancements. We also conduct comprehensive Pre-employment Background checks through our licensed leading vendors on all of the Tax Goddess staff. Detail of some of the more important checks that we perform include:
To maintain the highest security and confidentiality levels we perform regular assessments to determine how effective our current security protocols and inspections are in all areas related to data. Employee and Management pieces of security systems training are conducted at the beginning of employment and on an ongoing basis to ensure that every team member is up-to-date on the latest technologies and ensures long-term adherence to data security.[/vc_toggle][vc_toggle title=”Required Legal Documentation” css=”.vc_custom_1635539251169{background-color: #ffffff !important;}” el_id=”proto_content”]
As a part of the hiring process, Tax Goddess requires all staff to sign:
[vc_row][vc_column][vc_column_text]Please fill out the form below and press “Show Download Link” button to get the link.
[/vc_column_text]
[vc_row][vc_column][vc_column_text]Please fill out the form below and press “Show Download Link” button to get the link.
[/vc_column_text]
[vc_row][vc_column][vc_column_text]Please fill out the form below and press “Show Download Link” button to get the link.
[/vc_column_text]
[vc_row][vc_column][vc_column_text]Please fill out the form below and press “Show Download Link” button to get the link.
[/vc_column_text]
[vc_row][vc_column][vc_column_text]Please fill out the form below and press “Show Download Link” button to get the link.
[/vc_column_text]
[vc_row][vc_column][vc_column_text]Please fill out the form below and press “Show Download Link” button to get the link.
[/vc_column_text]
[vc_row][vc_column]