Onboarding Solutions, Paperless New Hire with Digital Onboarding

Security infrastructure and privacy controls focused on safeguarding your sensitive information

HR data should always be kept confidential. That’s why we focus fastidiously on protecting our customer’s data. To that end, we have built and implemented many of the same security and privacy controls used by top-tier financial institutions. On top of that, we regularly re-evaluate and test our security measures to ensure we align with industry standards & best practices.


  • Data transmitted between your browser and our application is encrypted using bank­-grade 256­-bit SSL certificates.
  • Sensitive data stored in our database is encrypted using bank-­grade 256­-bit AES encryption and a unique master key per customer.
  • Account passwords are stored using one­-way encryption so they can never be accessed in plain text (even by us).
  • Each customers’ data is sandboxed in a unique, protected database environment.

Application & Systems Security

  • We stay up-to-date on security patches and fixes from our vendors.
  • We follow industry best practices against man-in-the-middle attacks, injection attacks, and cross-­site request forgery.
  • Only individually-­authorized computers (such as those from our Engineering Team) can access our production servers.
  • We implement strict firewall and authentication rules on all of our production machines.

Data Center

Audit Logs and Monitoring

  • We maintain comprehensive audit logs covering all customer and user transactions, systems access, and network operations.
  • Passwords, social security numbers, and other sensitive information are automatically stripped out from log files and audit records.
  • We monitor our infrastructure 24×7 using a combination of third­-party monitoring services and in-house tools.


  • Production data is automatically and continuously backed up to multiple, separate locations.
  • We maintain daily backup records for the last 2 weeks of time, while our database enables us to perform point-in-time recovery.
  • Backup data is protected using the same safeguards we employ for our regular production environment.

Operational Security

  • Our application is built and maintained entirely in­-house by our core Engineering Team. Outside vendors never have access to any part of our code, databases, or application infrastructure.
  • Database and server access is restricted to Engineering Team members on a strict need­-to-know basis.
  • We eat our own dog food. We trust our own sensitive HR information to our application, making sure our security and privacy priorities never become misaligned with our customers’.

Questions and Concerns

To report a security concern, or if you have other questions or issues, please reach out to us.