Contact Us

Payroll Security

Solution: Access Definitiv.

The Access Group adopts industry-leading practices and technology to guarantee payroll and workforce data integrity and security. Access Definitiv has built-in security that is adaptable to your business needs. Security features include single sign-on, two-factor authentication and custom password policies for access. As well as 24/7 monitoring and safe encryption for all payroll and workforce data.

Trusted by over 5,000 Australian businesses 

Enterprise-Level Payroll Software Security

Access Definitiv is built with industry-leading practices and technology to guarantee the integrity and security of your payroll and workforce data. We make sure even at the client level, you can define your controls and rules in line with your company's security preferences.

Trustworthy Infrastructure
Trustworthy Infrastructure

Access Definitiv guarantees 99% uptime with service-level agreements in place. Using secure Amazon Web Services technology, all data is backed up and secured in Australian data centres to ensure maximum protection.

Safe Encryption
Safe Encryption

Access Definitiv has the highest level of security for payroll and workforce data with 256-bit TLS encryption for data in transit and at rest. Access Definitiv data is encrypted, making it virtually impossible for unauthorised access or interception.

24 Hour Mon
Monitored 24/7

To prevent any suspicious or unauthorised activity, Access Definitiv is monitored 24/7. With the aid of machine learning, any unusual activity is identified and flagged before it becomes problematic.

Independent Data
Independent Databases

Every business has an independent database, and all the data is backed up and stored at the client level to ensure the integrity of the data and to prevent data contamination from occurring.

Unique Url
Unique URL Per Client

Customers have unique URLs for their payroll and workforce management software access. Only the company can access its employees and payroll information using the unique URL.

Icon Countries Australia
Local Hosting

Data backups are on AWS and secured in Australian Data Centers. Encrypted at rest to ensure data is protected in all instances.

Multiple Availability
Multiple Availability Zones

Multiple AZ (availability zones) within AWS to provide high availability and minimise disruption.

Point Of Restor
Point of Restore

Access Definitiv provides a point of restoration for up to 35 days so there is little to no risk of data.

Backups
Daily and Monthly Backups

Access Definitiv is backed up daily and monthly, for recordkeeping purposes, monthly backups are retained indefinitely.

2 Factor
Mobile App Security

Our mobile app follows the same protocol as the web portal with additional of features like FaceID.

Keeping Your Business Running and Your Data Secure Is Our Top Priority

99 .5%

Uptime Percentage

5 min

Recovery Point Objective (RPO)

8 hours

Recovery Time Objective (RTO)

Configurable Security for Your Business Needs

Access Definitiv offers a big-picture approach to security. Our clients define their access controls and rules to align with their company security preferences.

Single Sign-On

Access Definitiv supports Single sign-on. Your IT Team can maintain centralised control over credentials, and authorisation access can be linked to Active Directory Federation Services (ADFS).

Configurable User Access

Access levels can be configured to individual tasks, enabling adequate segregation of duties; you can create as many user authorisation levels as you need. Multi-entity businesses can tailor access levels to suit their business needs.

Two Factor Authentication

Access Definitiv offers two-factor authentication (2FA) for secure access to prevent unauthorised users from accessing their accounts. ATO requires 2FA for all users who have access to other employees' super or tax information. 2FA is mandatory for these users and cannot be overridden.

Custom Password Policy

Access Definitiv allows you to define your password requirements in different ways, such as minimum password lengths and specific characters. You are in control of the password complexity and policy.

Independently Accredited

Data security is important to us, so we make sure our systems, processes, and procedures meet market demands.

Penetration Testing
Penetration Testing

Access Definitiv web and mobile apps are independently penetration tested annually or whenever changes are made that could impact security. Penetration testing is also referred to as a pen test.

Soc 2 Audits
SOC 2 Audit

Access Definitiv undertakes annual SOC 2 audits to ensure internal security practices to assure your business and auditors. This includes data security, availability, processing integrity, confidentiality and privacy.

IRAP
Global Standard

AWS certification reports provide an extensive list of global security standards, allowing Access Definitiv to meet specific government, industry, and company security standards and regulations, including ISO 27001, SOC 1, 2 & 3, PCI Data Security, Standard IRAP and FedRAMP.

Payroll Security FAQs

What is payroll security?

Payroll security protects sensitive data by managing and protecting employee personal data collected when onboarding a new employee and the and benefits and compensation information needed for payroll processing. It is essential to maintain accurate payroll records, comply with payroll regulations, and maintain payroll compliance. and protect the data from data breaches and hacks that can expose valuable employee data which can lead to identity theft and reputational damage.

Payroll security is achieved by using a robust payroll system like Access Definitiv.
To learn more about payrol security read our blog The 3 proven options to improve payroll security.

How secure is your payroll solution?

A secure payroll solutions like Access Definitiv safeguards sensitive employee data and prevents potential breaches. For your sensitive employee data to be protected, consider these essential factors when selecting a payroll solution:

  1. Encryption and security features: 

  • Ensure your payroll software has advanced security features like encryption and secure data storage. Make sure that the provider prioritises the security of their systems. 

  • Verify the software offers two-factor authentication (2FA) for added protection.

  1. Data Privacy and Location:

  • Review the security and privacy policy of the software provider. Know where your people and payroll data is stored - onshore or offshore.

  1. Regular Updates and Patches:

  • Check how often your software provider updates the software to ensure data security and that the data is safe against emerging threats.

  1. User Training:

  • Train your payroll staff on how to use the payroll system properly. Also, provide employees with security training and put security policies in place to protect the business and the employees. 

  1. Access Controls and Permissions:

  • Ensure your payroll solution is customisable to restrict payroll access from unauthorised personnel only. Most modern payroll solutions offer roles and permissions based on job responsibilities.

  1. Outsource payroll processing:

  • Outsource your payroll to payroll experts who have robust security measures. Ensure you evaluate their security protocols before outsourcing payroll processing.

  1. Internal Security Measures:

  • Strengthen your overall company security with firewalls, antivirus software, and encryption to protect all your systems and data. Document, assess and update security measures regularly to ensure safety.

  1. Employee Offboarding: 

  • When employees leave, keep security in mind. Promptly revoke access to all systems they used to ensure data security

How to keep payroll records secure?

Are you worried about the security of your payroll data? Then, there are several measures to manage payroll security for peace of mind.

  1. Safeguard your payroll data with a robust, secure payroll solution like Access Definitiv. Learn why Access Definitiv delivers on payroll data security. 

  2. Move to a real-time cloud-based payroll solution that offers permission-based access so you can control who has access to sensitive payroll data. 

  3. Ensure your company has a firm password policy across all its software applications. By implementing strong access controls and role-based permissions, you limit the users with administrative privileges and regularly review and update user access rights. 

Password policies that work: 

  • The minimum length of a password should be 8 - 12 characters

  • A combination of uppercase and lowercase letters, digits, and symbols.

  • Keyboard patterns should be avoided if possible.

  • Try not to rely on personal information even though it is easier to remember. 

  • Have a distinct password for each account you have to log into.  

Consider implementing a password management system for your team to simplify the management of complex passwords. Random password generation, secure storage, and monitoring for duplicate passwords or security breaches are all possible with these applications.