Process

The general outline of the process flow works in the following order.

Please refer to the flowcharts or FAQs section to understand more about the process.

  • TRIALS OR PILOT PROJECT
  • AGREEMENT
  • ACTUAL IMPLEMENTATION
  • FEEDBACK & REVISIONS
  • MONITOR PROCESS FOR OPTIMUM RESULTS

HOW DOES AA ACCESS CUSTOMERS DATA?

AA has the capability to offer various bandwidths from DSL Broadband to T1 capabilities. The selection of which line to use for your account is based on the evaluation of your requirements.

Remote Server Model

In this model AA will access your information and/or your system software securely using a VPN. All work will be done using the secure VPN connection by AA. The main advantage of this option is your records wouldn’t leave your office premise and AA can access your server securely without compromising the security of your data.

Application Service Provider Model

In this model AA connects to your third party Application Service Provider (ASP) software and enters information directly into the system. This model is similar to the Remote Access model, except we access your software through an offsite location to perform all tasks.

Secure File Transfer Model

In this model the customer will scan or save all documents that need to be processed to their FTP server. AA will use secure FTP software to transfer all the documents securely from the customers FTP portal into our server. AA will use the customer specified software to perform all the work at our facilities, then securely export the finished files back to the customers FTP server. The customers import the files into their system software.

Internet Portal Model

In this model AA uses your online portal to enter the data directly into your system. This model is similar to the Remote Access model, except we access your software through the internet which updates your local server database.

Custom Models

AA will work with your company on a hybrid or custom communication model based on your requirements.

For more details and questions about the process and security please review our FAQs section.