Webinar | Key Legislative Updates for the Hourly Workforce | Tuesday, September 24th | 12 PM CST

Has predictive scheduling legislation reached your workforce? How about salary history bans? If they haven’t already, they likely will soon. 

Join Jennifer Long on September 24, 2019 at 12 PM CST to find out how far these legislative trends have spread and tips for updating your policies and practices. Topics will include:

  •  Predictive scheduling laws
  • Overview of salary history ban
  • Various penalties for noncompliance
  • Tips for updating your policies and practices

Please enter a valid email address

Payroll Data SecurityInherently evident when it comes to payroll is the fact that confidentiality is a priority, first and foremost. While trust is an important aspect of working with employees and vendors, definitive measures must be in place and must be absolute to ensure that employee personal information and payroll related data remains confidential and secure at all times.

What is Payroll Data?

Payroll data security threats can come from outside, inside or stem from pure error. Personal information such as bank account numbers, home addresses, social security numbers and pay rates are necessary to process payroll and tax forms and cannot be compromised. Strengthening your defense strategy means upholding technology protocols and security measures as well as administering proper staff training in your payroll department.

Refine Your Payroll Data Security Procedures

In order to protect your company from payroll data security breaches, it’s important to ensure your procedures include training payroll employees on proper use of the payroll system on a regular basis. Doing regular audits of payroll procedures and payroll data security will ensure that employees are not getting bogged down by habits that inadvertently misuse the system, exposing potential security threats. Training employees on payroll system updates or revisions should be a regular part of your internal training plan as well.

Payroll System Updates

Speaking of payroll system updates, they should be applied to the payroll software in a timely fashion. Running an older version of the software may leave gaps in data storage and retrieval or provide the potential for security breaches. This ensures that everyone is on the same page and utilizing the system in its most current state. Payroll technology vendors typically apply updates to the system automatically, which provides peace of mind.

Email and Mobile Payroll Security Procedures

Your organization likely has an overall security policy to patrol threats through anti-virus and anti-malware software. Ensure that payroll system security is part of the overall security policy and that all payroll users are following organizational protocol on company issued equipment.

Confirm that email policies are strictly adhered to in the payroll department to minimize the risk of employees forwarding or receiving attachments while not realizing they have included confidential information.

Are payroll employees funneling through email correspondence on their smart phones? Are attachments encrypted? This is particularly important in our mobile world. Have a clear policy set for mobile access. If utilizing mobile, the security measures in place on their desktops must transfer to their mobile devices.

Make sure employees understand the signs that an email may be part of a phishing scam and that they follow procedures to report the email and delete it. If an email is asking for confidential information, be certain employees are contacted directly to ensure proper identification.

ease your payroll burden

Updating Login Credentials to Secure Your Payroll Data

Payroll system users should update their passwords on a regular basis. This policy should be clearly stated and understood as well as backed up with automated reminders. The FTC provides tips for businesses to apply security measures to prevent fraud.

Separation of Duties for Payroll Data

One of the oldest accounting safeguards that translate to payroll system security is applying separation of duties. Having the same employee create new hire records, collect timesheets, enter data and create paychecks could leave room for data breaches. Create clear silos for payroll data duties that ensure at least 2-3 different users are part of the payment process. Do regularly scheduled audits as well as ad-hoc audits from time to time.

Pay Check Printing

Avoid check fraud by utilizing high security check printing procedures. If you are outsourcing your payroll, ensure your vendor has these safeguards in place. Most providers go above and beyond in this area. Print only the minimum data necessary for a check to be cashed. Providing online self-service capabilities wherever possible for employees to retrieve their data rather than having it printed eliminates the risk of having checks lost or stolen. Ensure pro-active fraud measures are in place at your bank and that blank checks are fully secured.

Ultimately, your organization should build firewall technology with extra emphasis on employee sensitive information. Ensure your payroll vendor has strong security measures in place that meet or exceed your organization’s security policies.

Assessing All Data to Maintain Payroll Data Security

Taking a full assessment of the data that is in your care—and the entry and exit points of this data—will help you to understand the full scope of what you are protecting. By strategically securing each component of your payroll department and working closely with your technology associates and payroll vendor, you will be steps ahead of any security threats that might come your way.

You can be sure that data security is our top priority as your payroll provider. Our very first customer remains a happy EPAY customer today. As a matter of fact, we’ve maintained a 99% retention rate over the last several years.

Needless to say, we would love the opportunity to make you happy, too. Schedule a personalized demo today.

Leave a Reply

Your email address will not be published. Required fields are marked *