Blue Apple Partner Payroll Security |
|
Written by BlueApplePartner Payroll
|
Thursday, 11 February 2010 08:37 |
Security is critical for any organisation. Blue Apple Partner Payroll security goes far beyond what most companies have been able to achieve for themselves. Using the latest firewall protection, SSL encryption, and proprietary security products, Blue Apple Payroll gives you the peace of mind that only a world-class security infrastructure can provide.
Security is a multidimensional business imperative that demands to be considered at every level, from security for applications to physical facilities to network security. Below is an overview of how we handle security at various levels.
There are 3 benchmark reasons for utilising this facility:
Blue Apple Payroll protects your data by ensuring that only authorized users can access it.
1. Protection at the Application Level

|

|
Blue Apple Partner Payroll provides each user in your organisation with a unique email address and password that must be entered each time a user logs on. Blue Apple Payroll issues a session "cookie" only to record encrypted authentication information for the duration of a specific session. The session cookie does not include either the username or password of the user. Blue Apple does not use "cookies" to store other confidential user and session information, but instead implements more advanced security methods based on dynamic data and encoded session ID's.
|

|
All access to Blue Apple Partner Payroll is governed by strict password security policies and all passwords are stored in encrypted format in the database.
|

|
128 bit SSL encryption is present on every form within the system - this means your information is encrypted during transmission.
|

|
Administrators can define security roles and attach users to these roles. Roles can be defined to restrict or allow users to any form within the system.
|

|
Administrators can give users access to view specific employees that are in turn attached to organisation units defined on company level. This restricts users to only see employees details in specific units.
|

|
All employee self service users are only able to view their own profiles.
|

|
Reports that are emailed to users are sent in a password protected zip file.
|

|
An audit trail exists on every screen for traceability purposes.
|

|
Blue Apple Partner Payroll uses safe bank EFT transfer technology to receive information and to interact with the banks for bank account validations.
|
2. Protection at the Facilities Level
Blue Apple Partner Payroll has one of the most modern data centres in South Africa. The security in the data centre consists of visible and invisible physical measures and other facilities to guarantee an uninterrupted service.

|

|
Blue Apple Payroll is backed up every 15 minutes to a backup server and every evening a full offsite backup is also done.
|

|
No public access - Public access to the hosting facilities is strictly forbidden.
|

|
Video surveillance - Live video surveillance of the entire data centre is in place 24 hours a day. All entrances are monitored to the data centres to ensure that only authorized personnel enter them.
|

|
Access cards - A data-centre access proximity card system represents the second layer of security for entering the data centre. Access to the data centre itself is restricted to Certified Technical Points of Contact.
|

|
Biometric security - Biometric security systems are the third layer of security for entering the data center. Biometric hand scanners are used to restrict access to the data centre and only Certified Technical Points of Contact have use of the biometric hand scanner system to enter the data centre.
|
In addition, the following safety and redundancy measures are in place to ensure continuity and stability at the data centre:
|

|
N+1 redundancy - All critical systems in the hosting centres are N+1 redundant, and there are regularly audits and tests on all data centre systems to ensure their readiness and smooth operation. (N+1 redundancy indicates having a complete replica of the system in place, as backup should the primary system fail.)
|

|
Environmental monitoring - The data centres have N+1 redundant heating, ventilation, and air conditioning systems to ensure that, even in the event of a system failure, the hosting environment will not be affected. The data centre also has an advanced fire-suppression system in place to contain fire.
|

|
UPS (uninterrupted power supply) systems - The power systems are designed to run uninterrupted even in the event of a total power outage. All production systems in your hosting environment are fed with conditioned UPS power that will run whenever utility power fails. The UPS power subsystem is N+1 redundant, with instantaneous fail-over to generators to ensure continuity.
|

|
Diesel generator systems - Onsite diesel generators automatically start up in the event of a power surge or interruption in the power supply. The power and generator systems are regularly tested to ensure that they function properly in the event of a power failure.
|
3. Protection at the Network Level
Blue Apple Payroll uses proven security practices to ensure network security.

|

|
Blue Apple Payroll has outsourced the monitoring and management of our entire security infrastructure to Securicom who are a leading specialist IT security management and consulting company.
|

|
The following regular assessments are conducted by Securicom:
|
|
|
|
|
|
|
 |
Application vulnerability threat assessments. |
|
|
 |
Network vulnerability threat assessments. |
|
|
 |
Selected penetration testing and code review. |
|
|
 |
Security control framework review and testing. |
|
Last Updated on Thursday, 10 July 2025 13:30 |