Safeguarding Your Security, Privacy & Compliance
PNI•HCM is committed to safely and securely delivering an employee-first Human Capital Management (HCM) technology that helps our customers create the experience their employees deserve with isolved People Cloud.
Security
Discover the security measures we have in place to protect your information.
Privacy
Learn about our unwavering commitment to privacy across our entire platform.
Compliance
Learn about the proactive measures we take to guarantee strict compliance.
Rigorous safeguards with no compromises.
Our Commitment to Protecting & Securing Your Data
isolved's carefully crafted technology infrastructure and architecture are meticulously designed to ensure uninterrupted business operations.
With our robust security program and regular testing, safeguarding our clients' information remains our utmost priority. Rest assured, we are committed to providing a secure and reliable environment for your business.
Our team is deeply dedicated to ensuring security, privacy, compliance, accessibility, and ethical AI practices with unwavering commitment.
We have diligently worked to establish a relationship with each of our clients that is founded on trust and reliability.
Security & Risk Management for Comprehensive Protection
We continuously enhance our risk and security capabilities, investing strategically in our people, processes, and technologies to provide comprehensive protection to our customers, partners, employees, and valuable assets.
To ensure robust risk and security management, isolved conducts independent assessments and maintains board-level visibility into strategic cybersecurity and operational risk objectives.
Regular risk analyses and comprehensive testing of controls are conducted internally or by certified third-party providers to ensure ongoing safeguards across various control types.
Prioritizing People & Privacy
We highly value the trust our customers place in us and handle their data with utmost care. Our commitment to security ensures the protection of your personally identifiable information (PII), protected health information (PHI), and other nonpublic personal or financial information. Rest assured, we never utilize customer data beyond what's defined in our privacy policy and agreements, except when required by law.
By using isolved People Cloud, you have control over your own data to meet privacy and compliance requirements. We adhere to stringent industry standards and privacy laws at federal and state levels. Trust and safety are the foundation of our products and services, and we continuously enhance our privacy controls to adapt to emerging technologies and evolving needs.
Upholding Regulatory Standards with isolved People Cloud
Our range of products and services, including those powered by isolved People Cloud, are governed by local, state, and federal statutes and regulations. As a result, we uphold a robust Compliance Program that encompasses well-established policies and procedures. These compliance controls effectively address, prevent, detect, and mitigate any violations.
To ensure adherence, isolved controls undergo annual SOC audits. At PNI•HCM, our team diligently reviews, tests, and updates policies and procedures on a regular basis.
Physical & Logical Security
isolved's production systems are hosted on Microsoft Azure's cloud infrastructure in a state-of-the-art data center.
Secure
Virtual access to servers requires multiple layers of authentication.
Monitored
On-site security personnel monitoring 24/7 and integrated alarm systems.
Biometrics
Critical infrastructure requires two-factor biometric authentication.
Camera Surveillance
Camera surveillance systems at critical internal and external entry points.
Background Checks
All data center personnel must pass background checks.
Disaster Recovery
World-class Disaster Recovery and High Availability Architecture to maximum resiliency.
Frequently Asked Questions
How does isolved ensure the security of its platform?
isolved places high importance on security and operational risk management, continuously assessing its risk and security capabilities, and leveraging industry-leading providers and dedicated resources for comprehensive protection.
What type of security safeguards are in place?
Both isolved and PNI employ administrative, technical, and physical safeguards. This includes training, documentation, practices, policies, procedures, authentication solutions, firewalls, antivirus software, intrusion detection systems, and environmental controls like HVAC and humidity controls.
How does isolved handle compliance with regulations?
isolved's Compliance Program takes into account various local, state, and federal laws, including HIPAA, GLBA, and CPRA, and implements policies and procedures based on solid compliance controls, with annual SOC audits and regular reviews by their Compliance Department.
What measures are taken for fraud prevention?
PNI•HCM and isolved maintain strong controls and monitoring mechanisms to detect threats and contain fraud risk, continuously working to reduce fraud risk at all points in their product and service lifecycles.
Is the platform accessible to all users?
isolved People Cloud is designed to be inclusive and accessible, meeting W3C WCAG 2.0 at an AA conformance level, ensuring usability for a diverse range of users, including those with disabilities.
What type of risk assessments are conducted?
Regular risk analyses, including testing of cyber, system, and process controls, are conducted either internally or by certified third-party providers across various control types.
How does PNI protect sensitive customer data?
We are committed to protecting sensitive customer data through a combination of rigorous security practices and compliance with relevant laws and regulations.
Are there any training requirements for PNI employees regarding security and compliance?
Yes, PNI has stringent training requirements for all employees, ensuring they are knowledgeable and compliant with security and privacy practices.
How does PNI stay updated with evolving security threats?
PNI continuously monitors evolving fraud trends and adapts its security measures accordingly, ensuring the latest threats are effectively addressed.