Software features
Since the "Price Authentication Management System" was promoted and used in the province's price authentication center system, the standardization and electronic level of the province's price authentication business has been greatly improved.
——Director Lu Zaisheng (Shandong Price Certification Center)
It improves work efficiency, facilitates management, and is conducive to supervising the entire process of price verification. The use of this system has promoted the informatization and standardized development of our city's price verification undertaking.
——Fan Zilong, Deputy Director (Qingdao Price Certification Center)
Function introduction
◇ Business acceptance
For business entrusted by the entrusting unit or the entrusting party, registration will be carried out based on the business conditions. And prepare a business acceptance notice or a business rejection notice.
When accepting business, you can set the sponsor and co-organizer according to the division of labor, and automatically calculate the end date of the job based on the business type and acceptance period. After the acceptance is completed, it will automatically transfer to the business verification process, and the software will prompt the organizer and co-organizer to carry out the verification work.
◇Business verification
According to the type of entrustment and case type, it is determined to be an appraisal or certification business, and the authentication personnel will conduct the authentication work.
Business functions include all reporting documents and conclusion letters that need to be issued during the assurance process. Mainly include conclusion book cover, appraisal (certification) conclusion book, dossier cover, dossier catalog, technical report, authentication report, delivery receipt, matter letter, picture data, and other related materials.
After the business processing is completed, the forensic personnel will submit it to the center director or the director in charge for approval.
◇ Business approval
Approvers can use the software to view all information, verification process materials, calculation processes, etc. in the business. If there is no objection to the business authentication process and authentication results, the approval will be passed, and the business will be pushed to the authentication personnel, who will print the conclusion letter, etc., and file the case files. You can also correct the problems in the verification process and the report, and return it to the verification staff, who will conduct the verification again.
◇ Financial charge management
When the project enters the acceptance stage, the financial staff can start pre-charging for certification. Multiple charges can be recorded for each assurance engagement. The charging process is supervised by the leader, who can set the agreed fee amount for the case.
◇ Supervision and control
Leaders in charge can supervise and manage the entire process of the forensic business through the software and keep track of the case handling status at any time.
◇Business query statistics
The query function can query all the assurance projects of the unit, and view the assurance reports and assurance processes in the assurance projects. Support the inquiry of business reporting information of subordinate units, and keep abreast of and understand the business processing status of subordinate units.
Statistics on the number of cases, fees, subject matter amount, fees, etc. can be calculated based on the type of case, forensic personnel, forensic time, etc.
◇ Forensic Assistant
The software is equipped with an assurance work assistant that can quickly locate project reports, and also provides common tools for assurance calculations (including income method calculator, assurance fee calculator, etc.).
Main features
◇ Streamline the authentication business
The automated flow of verification business from acceptance, verification, approval to financial charging not only ensures the security of business information, but also greatly reduces the waste of time and resources caused by the circulation of written documents.
◇ Business approval layer by layer
In order to ensure the fairness and rigor of the verification results, business information is reviewed, approved and revised layer by layer by central leaders and leaders in charge.
◇ Controllability of assurance work
The software implements a work plan management model. The person in charge sets the processing date of the business, and the staff completes the appraisal work within the specified time limit, which serves as the basis for the assessment of the authentication personnel. If the specified working period is exceeded, you need to apply to the person in charge for an extension of time.
◇ Seamless integration with Office
The report part is embedded in Microsoft Word and Excel, and users can create and adjust report templates by themselves. Reports such as query statistics can be generated through Excel.
◇Confidentiality of business information
The software adopts multiple protection measures such as username and password login verification, database encryption and hardware encryption lock to prevent the leakage of authentication business secrets. After the verification business is completed and archived, other staff can view but cannot modify it, ensuring the internal security of the business information.
◇Easy to operate
The software is simple to use, easy to use, and highly efficient. This software adopts a fresh and bright interface style, making the forensic work easier and more comfortable.
it works
it works
it works