Data Security & Processing
Your data is secure and confidential with us.
Data Security During a Recovery Audit
SAS is committed to protecting the data of our clients before, during and after the recovery audit process. All of our clients’ data and our physical resources are protected by our security program supported by strong processes and controls.
SAS maintains a thorough disaster recovery and business continuity plan implemented to restore critical computer applications orderly to minimize the disruption to business that would negatively impact your corporate image, profitability and relationships with clients. This plan includes a pre-established documented description of what constitutes a disaster and provides guidance when a decision has to be made.
Data processing starts with data acquisition. SAS works with your IT department to request the specific data needed for the recovery audit. We do not ask for any customized programming as we can handle full table extracts from your system. All data is immediately analyzed to insure completeness and to identify any errors in the extraction of the data. This process uses minimal time from your IT personnel.
SAS has expertise in analyzing data from any type of ERP system including SAP, Oracle, JDE, Peoplesoft, Lawson, Great Plains, and homegrown legacy systems. We also receive data from many other sources including Excel, Access, Text, SQL, and PDF. We are experts at merging data from multiple systems and sources to allow for a thorough and detailed recovery audit that will maximize your profit recoveries.
Email analysis is a critical component of a recovery audit. There are numerous attachments that will enhance a recovery audit. In addition, the body of the email can contain crucial information that is not properly translated into a contract or other purchasing-related documentation.
Our IT Analysts have years of experience working with large and disparate data to identify opportunities for our auditors to recover dollars for your organization. The final processed data along with the potential claims are loaded into our proprietary customized software that allows our recovery auditors to work efficiently and productively on the behalf of our clients.