Organization structure

We have adopted company structure that resides between hierarchical and flat organization structure. Experienced personnel take the lead as project manager. Each project manager work with multiple task managers who work with their small teams.

Operational model
Each operation is carried-out by the small team of personnels lead by task manager. Task managers collaborate with one another and guided by the project manager. Project manager manage the process, timeline, quality operations and client-side communications.

All the departments i.e. operations, marketing, HR work in integrated way that ensures transparency in process

Quality Policy & Practices
"Quality is conformance to client's requirements." - That is how we understand quality at i vesta technologies.

Offshore outsourced work requires commitment to quality because volume, frame of reference and thus process always has differences at client side and at processing unit. Here arises the opportunity to define the process requirements and output in detailed and measurable ways.

Right from the infrastructure level we have kept quality in mind. Stable and efficient operating environments along with various tools are the base.

For all the offered services we have measurable input requirements as well as output quality. In case of custom services we carry-out extensive requirements analysis and define the process. The process defines the measurable quality of the output with the help of test data. In most of the cases process improvement is carried-out to further improve the output results.

Our workforce is equally passionate about quality. They put strong emphasis on each step of the process. All of us at i vesta technologies knows, Quality is not an instance but the process. And, we are committed to it.

Security Practices
Security is the responsibility and core aspect at each stage of offshore outsourced work. i vesta technologies has well-defined security policy and implemented through security practices.

Some of the note worthy features of security policy and thus practices are described under.
  • Non-Disclosure and Non-Compete agreement binding all the employees.
  • Nothing is allowed to take in or out of work area.
  • Separate, secure areas for servers and data storage allowing only authorized and logged access.
  • Strict time bound authorized access to work area and work stations.
Confidentiality Practices
Information provided by our clients in any form will be kept strictly confidential. Confidentiality is vital in every way at every stage at i vesta technologies.

Some of the note worthy features of confidentiality policy and thus practices are described under.
  • All data provided by the client in any form will be kept strictly confidential and it will be client's property.
  • i vesta technologies will never share or expose client data to any third party.
  • Neither i vesta technologies nor its employees will reproduce or transfer data in unauthorized way.
  • All the data in raw, processed or intermediate form will be the property of the client.
    After completion of project all the data in any form will be stored in safe custody till specific retention period, delivered back to client or destroyed as per client request.
 
 
     copyright ivesta technologies 2009. design: mayuri multimedia