Let us come to you! DocuPros offers on-site pickup services for every job so you don't have to lift a finger. Files aren't boxed up yet? No problem! We can handle that too in one swift process.
We understand that every business has different needs- and no two jobs will have the same indexing requirements. That's why we give clients the freedom to choose how they want folders organized and named, with no limit to the amount of individual files or parent folders.
Need a file while it's in our possession? Simply give us a call with the file name and we will immediately scan the document and send it to you digitally. Every single file is accounted for during the scanning process and can be accessed with a simple call.
Our OCR installation services are recommended for larger jobs that have too many files to individually search for. OCR allows for all PDFs within the software to be searchable, meaning each file is available with a simple click of a button.
Once all files are digitized, we offer in-house shredding services so no additional shipping costs are incurred. We send the final hard-drive for review, and once approved, we shred the paper documents and return a Certificate of Destruction.
We have the experience and capability to handle all of your scanning and back file requirements. Secure and professional procedures are employed from start to finish and our experts can customize a plan tailored to fit your specific business and budget.
You demand flexibility and we deliver. We can scan at our facility or yours; Pick up & delivery. Daily, weekly or monthly; we are mobility specialists.
Scanning Capabilities
We can scan just about any size document. Smaller documents (ledger, legal, letter, etc.) are scanned on high production scanners, indexed and ready to upload into your system, often within 24 hours. We also have the capability to scan large format documents and drawings.
Here is a list of what we scan:
Quality you can trust
Utilizing a team of processing experts and state-of-the-art OCR/ICR technology, our data validation and quality control procedures ensure the integrity of your documents are maintained through the conversion process.
Our promise
To provide dedicated professional service that exceeds your expectations. Every client is treated with friendly, dependable and dedicated service.
A Simple Philosophy
We do what we say and we say what we do. Let us handle all of your document needs!
Physical Environment
✓ Secure Areas – IT facilities supporting critical or sensitive business activities are located within secure areas.
✓ Physical Security Perimeter – Strategically located barriers around defined perimeters provide physical security protection throughout the facility where sensitive business activities occur.
✓ Physical Entry Controls – Only authorized personnel can gain access to secure document scanning and processing areas by use of bio-metric finger print scan.
✓ Security of Data Centers and Computer Rooms – Physical security for data centers and computer rooms is established that is commensurate with possible threats.
✓ Isolated Delivery and Loading Areas – The data center and computer room delivery and loading areas are isolated to reduce the opportunity for unauthorized access.
✓ Equipment Location and Protection – Equipment is located to reduce risks of environmental hazards and unauthorized access.
✓ Power Supplies – Electronic equipment is protected from power failures and other electrical anomalies.
✓ Cabling Security – All power and telecommunications cabling is protected from interception or damage.
✓ Equipment Maintenance – Procedures are established to correctly maintain IT equipment to ensure its continued availability and integrity.
✓ Separation of Development and Operational Facilities – Development and operational facilities are segregated to reduce the risk of accidental changes or unauthorized access to production software and business data.
✓ Environmental Monitoring – Host computer environments, including temperature, humidity, and power supply quality, are monitored to identify conditions that might adversely affect the operation of computer equipment and to facilitate corrective action.
✓ Media Handling and Security – Computer media is controlled and physically protected to prevent damage to assets and interruptions to business activities.
✓ System Planning and Acceptance – Advance capacity planning and preparation ensures the proper availability of adequate capacity and resources as customer demands grow.
Network Management
✓ Protection from Malicious Software – Precautions are taken to prevent and detect the introduction of malicious software to safeguard the integrity of software and data.
✓ Virus Controls – Virus detection and prevention measures and appropriate user awareness procedures have been implemented.
✓ Network Monitoring – Security of computer networks are monitored 24x7 and managed to safeguard information and to protect the supporting infrastructure.
✓ Network Security Controls – Appropriate controls ensure the security of data in networks and the protection of connected services from unauthorized access.
Electronic File Access
✓ 256 K Bit Encryption – Data stored on the file server is encrypted using the maximum encryption available, 256K.
✓ Transport Layer Security – All communication is delivered over an industry standard 128 bit encrypted TLS.
✓ Access Controls – User access to files is strictly granted on permissions basis by authorized administrators according to management approvals.
✓ Active Directory Integration – You can manage your users from Active Directory ensuring you only need one user store.
DocuPros, LLC is very proud of our security record and our staff works diligently to maintain the greatest levels of security possible. We have experience protecting and processing sensitive information. From a security prospective, our processing centers have stringent procedures to ensure protection of sensitive data and a secure chain of custody.
DocuPros, LLC frequently performs security assessments drawing on software vulnerability categories from National Institute of Standards Institute of Standards and Technology (NIST), Common Weakness Enumeration (CWE), and OWASP to provide a thorough risk assessment. Some of the areas of the application that are tested for various vulnerability attack scenarios include: