Data Security


Every day, we process tens of thousands of data transactions for our clients. Many of these transactions involve personal data, financial information, or other highly sensitive data. Therefore, we take security and compliance extremely seriously—and incorporate multiple layers of security protocols into our software and information security processes as part of a comprehensive data security plan.

Before you choose a Vendor Management System (VMS), it is important to understand that not every VMS is equally secure. When your organization stands to gain so much from implementing a contingent workforce management solution, it would be foolish to risk all these gains by accepting anything less than the strongest possible measures for managing the security of your data.

Beeline’s uncompromising approach to data security ensures the best possible protection of personal and company information, from the underlying hardware and software architecture to the regular scans and periodic audits that provide ongoing assurance that your data is secure.

State-of-the-Art Data Centers

Beeline has six data centers on two continents, with primary and secondary data centers in both the U.S. and Germany. In the U.S., we have data centers for both Beeline VMS and IQN VMS. This capability reflects our commitment to being the best global VMS provider with regional services for international companies.

We know that many European companies have concerns about liability and confidentiality issues, sensitive company and personal information, as well as data security. These companies gain confidence knowing Beeline is a trusted Software-as-a-Service (SaaS) solution provider that can host their data within Europe, closer to their operations and covered by European data protection and privacy laws, including GDPR and the Privacy Shield Framework.

Our European data center represents a substantial component of our global commitment and strategy.

Doug Leeby Beeline President

Privacy Shield and GDPR

The U.S. and the EU have agreed to the Privacy Shield Framework, designed by the U.S. Department of Commerce, and the European Commission and Swiss Administration, respectively, to provide companies on both sides of the Atlantic with a mechanism to comply with data protection requirements when transferring personal data from the European Union and Switzerland to the United States in support of transatlantic commerce. Beeline is Privacy Shield certified and our certification covers both Beeline VMS and IQN VMS.

Beeline has taken steps to be compliant with the GDPR, including rewriting policies, appointing a Data Privacy Officer, setting up a process to handle complaints or concerns about the way in which personal data is being used, assigning an ADR, creating a data breach response to comply with the reporting requirements and timelines. Beeline also understands that one of the most difficult aspects of the GDPR law to comply with is the right to be forgotten, and is taking strides to ensure that we can provide the capability for all of our customers to enact this right through our VMS solutions. Beeline continues to monitor the implementation of the GDPR and make changes as necessary.

Successful Completion Of SOC 1 and 2 Examinations

Beeline has successfully completed SOC 1 and SOC 2 examinations. Performed by industry-leading accounting firms, these Service Organization Control (SOC) examinations are standards established by the American Institute of Certified Public Accountants (AICPA).

The SOC reports further position Beeline as a strong partner for its control environment, specifically surrounding financial, security, and confidentiality. Successful completion of the SOC examinations allows Beeline to provide customers with detailed information regarding the system and controls that impact internal controls in financial reporting, and allows Beeline to ensure that policies, processes, and procedures are in place to protect customer system resources and information designated as confidential.

Annual SSAE 18 and ISAE 3402 Audit Processes

Beeline adheres to rigorous, year-round Standards for Attestation Engagements (SSAE 18) and International Standard on Assurance Engagements (ISAE 3402) audit processes, offering a full year auditing window to ensure our clients’ audits have full coverage. Both SSAE 18 and ISAE 3402 engagements allow Beeline to have its control policies and procedures evaluated and tested by an independent party.

Faster, safer web access with Cloudflare

Beeline uses Cloudflare – a premier Internet content delivery network that provides web application acceleration to all corners of the earth while ensuring security, reliability, and integrity of data across its global network. If Cloudflare should ever go offline, traffic would redirect to the Beeline network and route the data through Beeline data centers.

Data centers only offer physical protection of data, so to better address all aspects of security, Beeline implemented additional layers of protection by deploying Cloudflare’s security services to block attacks. Cloudflare detects and deflects threats in HTTP and HTTPS traffic before they ever reach the customer.

Security is a concern for everyone, and this solution allows us to respond quickly to vulnerabilities and ‘zero-day threats’ on a 24/7 basis.

Jason Creson Beeline Vice President, Technical Operations

FIPS 140-2 Storage

Beeline can also store client data in compliance with Federal Information Processing Standard (FIPS) 140- 2 encryption. FIPS 140-2 describes the encryption methodology used to accredit cryptographic modules. If an outside source somehow obtained a client’s data, the encryption would render that data useless to the perpetrator.

Technology Partners Recognized As “Magic Quadrant” Leaders

We minimize clients’ risk of exposure to the latest threats and vulnerabilities. Despite dynamically changing environments and attacks, Beeline leverages industry-leading technologies for automatic provisioning, tuning, and enforcement of security policies and rules across control points—without manual intervention. These technologies include:

  • Endpoint Protection
  • Application Security Testing
  • Analytics Reporting

Experienced, Dedicated, Award-Winning Teams

A dedicated information security and privacy team stays on top of continuously evolving industry best practices and implements those into the Beeline technology. Robust identity management ensures the right people have access to the right information at the right time.

Security Checklist

Ensure you are asking the right questions of your technology provider.

Learn more

Top
Copyright © 2018 Beeline All Rights Reserved