Functional features of Yifan property charging system
1. Simple and easy to use, graphical navigation is completely designed according to the property management workflow and operating habits. Ordinary operators do not need to worry about operational difficulties.
2. The system supports networking through local area network and Internet, and the number of clients is not limited.
3. Supports multi-community distributed management, and can assign different jurisdictions to each login account. The company headquarters can view the data of each charging community it manages in real time anywhere.
4. The system supports directly importing owner information from Excel and quickly establishing owner files.
5. All visible tables can be exported to word, excel and other formats
6. Charges for charging items can be set freely, and the charging methods and prices of charging items can be changed at any time.
7. The charging cycle is flexible and diverse, and can be charged monthly, quarterly, etc. or a customized period of time
8. Supports batch charging and the last charging limit to automatically generate the current charging minimum.
9. The charging document supports operations such as quantity reduction and exemption, discounts, etc., and can display the owner's arrears period, amount and other information in real time
10. Support the function of suspending charging for vacant rooms
11. Support the collection or disbursement (refund) of temporary expenses such as deposits and cost of construction fees
12. Complete document invalidation function, you can freely set the document invalidation period, such as one day, two days, etc.
13. Complete data query function: if charged, uncharged (arrears), etc.
14. Rich data summary functions, such as: collected/arrears daily report, monthly report, charge item summary, charge summary (collection rate), arrears, etc., and can specify which collector
15. Rich and diverse system settings, such as arrears reminder, invalid data turning red, system exit and automatic data backup, etc.
16. Complete permission configuration function, different usage permissions can be set according to the type of logged in user
17. It has a system log function, which can record in detail which computer uses which client to log in to the system and exit the system.
18. The system has a built-in safe and efficient database system and provides complete database backup and recovery functions.
it works
it works
it works