Clients provide us with sensitive payroll data to manage their payroll function. We implement strict protocols within our IT servers and employees. The Keys team are trained on the implications and procedures of safeguarding our client’s information and conforming to confidentiality policies.
We limit information access and disclosure to authorized users only. Users are authenticated to access any information by passwords that change on a regular basis. We have control methods that limit each identified user’s access to data on our servers. Our PCs and servers are protected against Malware, Spyware, Spam and phishing attacks. We have strict IT policies to ensure integrity, availability and confidentiality of data. We carry out security risk assessments for all the business processes under our confidentiality policies. These cover all aspects of the network and file servers that are used to support business processes. We have also a disaster recovery plan in place, in case of any disasters.
As a result of our policies and procedures, we are confident of our track record and to-date have not suffered a security breach.