Five Features that Keep Your Data Secure

Keep Your Data Secure

In Web TimeSheet, you manage several types of confidential data including project pricing, client information, and payroll records. You need to control who sees this private information. Fortunately, our Software-as-a-Service (SaaS) products are specifically designed to keep your data secure. It will be safe from prying eyes while giving the appropriate amount of access to the users you select.

Here’s how it works:

Secure Browser Connections

The Web TimeSheet host server features Secure Sockets Layer (SSL) protocols. That means all the information sent between your computers and our host server will be encrypted. This keeps your confidential data safe from external parties.

Secure browser connections

 

Customizable Permissions

Every action a user can take in the Web TimeSheet system requires permission. This includes viewing or modifying data, running reports, entering time worked, creating a project, etc. You get to decide who can do what. Use our standard role-based permissions profiles to quickly assign access to each user in your organization. You can fine tune these profiles to restrict or add more capabilities if necessary.

Customizable permissions

 

Hierarchy Filtering

Hierarchy filtering prevents users from viewing or editing data outside their own department. A single mouse click allows you to activate this option and ensure confidential information is only accessed on a “need to know” basis.

Hierarchy Filtering

 

Password Restrictions

Your overall data security is increased when you use complex passwords and change them regularly. Web TimeSheet helps you follow best practices in this area. You can decide how complex user passwords must be and when they will expire.

Password restrictions

 

Idle User Session Timeout

Use our automatic timeout feature to choose how long Web TimeSheet can be left idle before the system automatically logs the user off. If a user forgets to sign out before leaving their workstation at the end of a session, the amount of time their private data is accessible to unauthorized users will be limited.

Idle user session timeout

 

Do you have questions about additional steps you can take to increase your level of security? Ask us in the comments section. Also, remember to connect with us on Twitter and LinkedIn to keep up with our latest announcements.

 
Naveen Venkat

ABOUT THE AUTHOR

Naveen Venkat

Naveen is the Director of Support Services at Replicon. Replicon provides award-winning products that make it easy to manage your workforce. With complete solution sets for client billing, project costing, and time and attendance management, Replicon enables the capture, administration, and optimization of your most underutilized and important asset: time.

get-started-today

Get started today.
Set up a free trial based on your business needs.

Start Free Trial

Global Compliance Desk – Poland

Global Compliance Desk – Poland

In a highly competitive market, service-based businesses need to capitalize on any opportunity to set themselves apart from their (often very similar) competitors. While implementation, system details, and service management… Read More
employee working on laptop

What Is Time Off in Lieu (TOIL)?

The onset of AI and smart machines automating formerly-human jobs has been discussed at length as of late -- often in relation to manufacturing and manual labor jobs. And yet,… Read More
Unlock-Maximum-Value-Post-M&A--

How Time Tracking Can Fuel and Serve as a Catalyst Post M&A

Time magazine labels the millennial generation the “most threatening and exciting generation,” infamous for “narcissism [and] its effect: entitlement.” In the workplace, the perception of the millennial workforce is no… Read More
Demystifying the millennial workforce: 5 tips from Trunk Club’s Andrew Anderson Devine

Demystifying the millennial workforce: 5 tips from Trunk Club’s Andrew Anderson Devine

Time magazine labels the millennial generation the “most threatening and exciting generation,” infamous for “narcissism [and] its effect: entitlement.” In the workplace, the perception of the millennial workforce is no… Read More

Time and Attendance Orientation Guide

In a growing business, the day will eventually come when managing time and attendance on paper becomes both inefficient and risky, especially when trying to balance things like overtime, paid… Read More

Employee time tracking is dead

iBeacons, Bluetooth Low Energy, Proximity sensing and the obsolescence of time tracking as we know it. Businesses have to track the time their employees work for a variety of reasons,… Read More
  • Polaris
  • Time & Project Insights
  • Time & Projects Solutions
  • Replicon Products
  • Replicon Users
  • Enterprise Time Tracking
  • Thought Leadership
  • Cloud
  • Corporate
  • Professional Services Management
  • Shared Services Management
  • Time and Attendance Management
  • Customer Feature
  • Time Intelligence
  • Industry News
  • Global Compliance Updates
  • Others