NJC is continuing the revolution in information transmission and dissemination.
We have continued to apply our technology in the drive to increase postal and information transmission service effectiveness and efficiency.
We provide a range of document services and mailroom facilities management, designed to optimise your internal mailroom function and strip out costs.
By outsourcing your post room, we can provide staff to sort mail and perform a number of other tasks within your operation, including stationery management, managing copiers and printers or even a document archiving solution.
We can raise awareness and the profile of your post room by providing and managing a robust, innovative and cost effective solution.
We provide 'first class' room services through:
- Simple, logical processes backed up by state-of-the-art ICT solutions.
- Recruiting and training capable, customer focused, well presented personnel.
- Sound security and post screening procedures.
- Online, transparent performance measurement and audit trail.
- Bespoke designed software to meet your particular requirements.
The post room service provided by NJC focuses on customer service and providing complete transparency of operations. This ensures that recipients are well informed and are able to feel in control, by tracking their post and packages online. Using bar code technology and PDAs (Personal Digital Assistants) that synchronise to the main database over the internet, all operational data is collected, providing a full audit trail. All recipients are be able to access the Amonet™ web application to monitor open jobs and historical performance data relevant to them.
The performance of our post room service can be measured against pre-defined SLAs and KPIs. Our customers can see how we are performing via the Amonet™ web application.
All NJC post room personnel undertake scanner operator and suspect package training to enable them to use X-ray machines safely and spot potential threats made visible by the X-ray. The training teaches operatives how to assess a potential threat and how a perpetrator would plan a terror attack.