360 Virtual Assistance L.L.C.
360 Virtual Assistance L.L.C.

Policies

Client Vetting:

360 VIRTUAL ASSISTANCE reserves the right to accept or reject requests for assistance based upon the nature of those requests. As a rule, we do not accept requests to perform work that does not align with our capabilities or values. For example, we do not accept requests to perform work that promotes criminality, discrimination, hatred, and cruelty to humans or animals.

 

Contracts:

The Contract is the legal instrument by which 360 VIRTUAL ASSISTANCE agrees to deliver fee-based services to its clients.

 

Consultations:

Consultations are scheduled by appointment. The initial 10-minute consultation is free. Subsequent consultations are fee-based. 

 

Confidentiality and Privacy: 

Confidentiality and privacy are priorities at 360 VIRTUAL ASSISTANCE. Therefore, we have developed electronic, physical, and managerial procedures to ensure, to the greatest extent possible, that there is no unauthorized or unnecessary disclosure of our clients' personal, proprietary, or copyrighted information. Communications are maintained in confidence by our firm and its assigns. We do not disclose our clients' information to third-party affiliates beyond those that are collaboratively involved in, and legally bound by, contract fulfillment. We do not rent or sell our clients' information. 

 

Cloud-computing, printing, storage, and protection:

360 VIRTUAL ASSISTANCE utilizes cloud-based and non-cloud-based production platforms to prepare, duplicate, transfer, and manage files. To secure the transfer and storage of data, our cloud uses industry-leading SSL encryption technology, firewall protection, intrusion detection, user authentication, and e-shredding. However, we honor our clients' requests to have their content created in a non-cloud based environment. 

 

Physical Security:

Access to our facility is controlled and monitored. Only authorized personnel can access our facility, computers, and copiers. Therefore, unscheduled walk-in visits are prohibited. Office visits are arranged strictly by appointment.

 

Secure Printing, Copying, Scanning, and Faxing:

Because we provide CCaaS (Chain-of-Custody-as-a-Service) to our clients, we take specific steps to protect the confidentiality and integrity of our clients' data and media:

  • Our Xerox press is Common Criteria Certified.
  • Authentication is required for access to our computers and copiers.
  • Internal Security Audit Logs permit tracking of activity at our Xerox devices and logging of the transfer of Personally Identifiable Information.
  • Our Xerox copiers have firewalls that restrict access via IP Address Filtering, Domain Filtering, and Port Blocking.
  • Data Encryption: files saved to and read from our Xerox hard drives are encrypted.
  • Image Overwrite Security: our Xerox copiers electronically erase data that has been processed to hard drives in print, copy, scan, and fax modes using a three-pass algorithm specified by U.S. Department of Defense Directive 5200.28-M.
  • Deployment of Xerox technology ensures our compliance with security standards in the government, military, health (HIPAA), legal (Sarbanes-Oxley), financial (Gramm-Leach-Bliley Act), and pharmaceutical (FDA 21 CFR Part 11) sectors.

 

Proofing

Pre-flight (prior to duplication), clients bear the final responsibility of proofing and validating by signature the accuracy of their print and digital content.

 

Same-day Service

Depending upon the nature of your project, your deadline, and our job queue, we may be able to provide same-day service. However, you must call ahead to discuss this option. Contingent services will incur an additional charge, representing 50% of the base service rate.

Print Print | Sitemap
360 VIRTUAL ASSISTANCE is a registered service mark of 360 Virtual Assistance, L.L.C. All rights reserved. 2013-2017. Website designed by 360 VIRTUAL ASSISTANCE.