Contact Us Contact Us Replicon Login

Five Features that Keep Your Data Secure

  • Replicon Facebook
  • Replicon Twitter
  • Replicon LinkedIn
  • Replicon pintrest
Keep Your Data Secure

In Web TimeSheet, you manage several types of confidential data including project pricing, client information, and payroll records. You need to control who sees this private information. Fortunately, our Software-as-a-Service (SaaS) products are specifically designed to keep your data secure. It will be safe from prying eyes while giving the appropriate amount of access to the users you select.

Here’s how it works:

Secure Browser Connections

The Web TimeSheet host server features Secure Sockets Layer (SSL) protocols. That means all the information sent between your computers and our host server will be encrypted. This keeps your confidential data safe from external parties.

Secure browser connections

 

Customizable Permissions

Every action a user can take in the Web TimeSheet system requires permission. This includes viewing or modifying data, running reports, entering time worked, creating a project, etc. You get to decide who can do what. Use our standard role-based permissions profiles to quickly assign access to each user in your organization. You can fine tune these profiles to restrict or add more capabilities if necessary.

Customizable permissions

 

Hierarchy Filtering

Hierarchy filtering prevents users from viewing or editing data outside their own department. A single mouse click allows you to activate this option and ensure confidential information is only accessed on a “need to know” basis.

Hierarchy Filtering

 

Password Restrictions

Your overall data security is increased when you use complex passwords and change them regularly. Web TimeSheet helps you follow best practices in this area. You can decide how complex user passwords must be and when they will expire.

Password restrictions

 

Idle User Session Timeout

Use our automatic timeout feature to choose how long Web TimeSheet can be left idle before the system automatically logs the user off. If a user forgets to sign out before leaving their workstation at the end of a session, the amount of time their private data is accessible to unauthorized users will be limited.

Idle user session timeout

 

Do you have questions about additional steps you can take to increase your level of security? Ask us in the comments section. Also, remember to connect with us on Twitter and LinkedIn to keep up with our latest announcements.

 
  • Replicon Facebook
  • Replicon Twitter
  • Replicon LinkedIn
  • Replicon pintrest
Naveen Venkat

ABOUT THE AUTHOR

Naveen Venkat

Naveen is the Director of Support Services at Replicon. Replicon provides award-winning products that make it easy to manage your workforce. With complete solution sets for client billing, project costing, and time and attendance management, Replicon enables the capture, administration, and optimization of your most underutilized and important asset: time.

X

Automate your Scheduling with Replicon's AI-Powered Workforce Management Platform

scroll top