Background Check Security
Protecting your company's and your potential employee's information
Our background check software partner TazWorks™ recently discussed their SOC 2, and PCI DSS security certifications that pair with their previous AICPA attestation certifications.
An attestation from AICPA affirmed TazWorks' controls and processes adhere to the highest principles. This report certified that background screening reports retrieved through TazWorks background check software are:
- Security — Company and potential hire information protected against unauthorized access with multi-factor authentication, sufficient firewalls and intrusion detection.
- Availability — System is available consistently with 99.95% uptime and continuous performance monitoring.
- Processing — System processing in transactions is complete, accurate, timely, and authorized
- Confidentiality — Information about your company or your potential employee stays confidential through encryption, access controls and permissions, firewalls and information policies and procedures.
- Privacy — Personal information is collected, used, retained, disclosed, and destroyed appropriately.
Online Employment Background Check Data Security
Our online employment background check services are secured with industry leading measures from Amazon Web Services. Security is one of the most important human resources goals. To ensure your background check data security HireSafe uses a background check platform called Instascreen™ that is supported by Amazon Web Service (AWS). This protects your background check information from external attacks while stopping unauthorized access. AWS also protects your data from worms, trojans and stops other malicious data. To put your security concerns at ease our network is fully monitored by the experts at AWS 24/7.
AWS security benefits
The AWS cloud infrastructure has been built to be one of the most flexible and secure cloud computing environments available today. It provides a reliable and scalable platform. This enables us to deploy your applications quickly and securely.
Designed secure from the ground up
The AWS cloud infrastructure is housed in data centers designed to satisfy the requirements of our most security sensitive customers. The AWS infrastructure has been designed to provide the highest availability while putting strong safeguards in place regarding customer privacy and segregation. When deploying systems in the AWS Cloud, it helps by sharing the security responsibilities with our clients. AWS manages the underlying infrastructure while our clients can secure anything that they deploy within AWS.
Constantly monitored by security experts
The Amazon Web Service infrastructure is protected by extensive network and security monitoring systems.. In addition, AWS infrastructure components are continuously scanned and tested. The AWS production network is segregated from the Amazon corporate network, and access to this network is monitored and reviewed on a daily basis by AWS security managers.The AWS production network is segregated from the Amazon corporate network and requires a separate set of credentials for access, consisting of SSH public-key authentication through a bastion host using an MFA token. This access is monitored and reviewed on a daily basis by AWS security managers.
AWS purpose-builds most of our security tools to tailor them for AWS’s unique environment and scale requirements. These security tools are built to provide maximum protection for your data and applications. This means AWS security experts spend less time on routine tasks, and are able to focus more on proactive measures that can increase the security of your AWS Cloud environment.
AWS builds its data centers in multiple geographic regions as well as across multiple Availability Zones within each region to offer maximum resiliency against system outages. AWS designs its data centers with significant excess bandwidth connections so that if a major disruption occurs there is sufficient capacity to enable traffic to be load-balanced to the remaining sites, minimizing the impact on you.
Each certification means that an auditor has verified that specific security controls are in place and operating as intended. You can view the applicable compliance reports by contacting your AWS account representative. For more information about the security regulations and standards with which AWS complies, see the AWS Compliance webpage.To help you meet specific government, industry, and company security standards and regulations, AWS provides certification reports that describe how the AWS Cloud infrastructure meets the requirements of an extensive list of global security standards, including: ISO 27001, SOC, the PCI Data Security Standard, FedRAMP, the Australian Signals Directorate (ASD) Information Security Manual, and the Singapore Multi-Tier Cloud Security Standard (MTCS SS 584). For more information about the security regulations and standards with which AWS complies, see the AWS Compliance webpage.