employement_screening

blog_1

Specific Highlights Include

  • Multi-layered security standards for various levels of sensitive data.
  • Ongoing internal vulnerability testing.
  • SAS 70 compliance on host systems.
  • All sensitive data is transmitted securely via SSL connections.
  • Any data preserved beyond the life of a transaction is securely archived.
  • Existing end-user practices can be maintained.

Recent Post

Subscribe Here

Subscribe to The Works for monthly updates and insight on changing hiring laws and background check best practices.

    What Our Customers Say