Secure application hosting and proactive regulatory monitoring

Confidence that your applications and data are always protected, available and compliant

Secure Access from Anywhere

advanced workflow basys
  • High availability cloud-based application hosting
  • Applications are protected by Taft-Hartley’s first SOC 2 Type II secure data center

  • Access your BASYS Platform system from any secure internet connection, giving you flexibility to run your office in the way that makes the most sense for your operation and resources

Stop Buying Hardware

basys hardware servers
  • Application hosting provides all hardware and operating system software for licensed applications
  • Includes installation, configuration, loading, testing and deployment of new hardware

  • Full encrypted application and database backups nightly

  • Hardware and related IT infrastructure updated regularly

Who’s Accessing Your Data?

basys protect your data
  • HIPAA audit rules require you to know and control who accesses personal data in your system

  • Secure Enhanced Audit Logging (SEAL) from Bridgeway lets you track who is viewing, changing or accessing your data

  • Customer-configurable role-based access – you decide who accesses what records and files

Trust Your Compliance

compliance basys
  • Bridgeway Compliance Team tracks regulatory changes and proactively consults with affected customers on expected impacts and proposed solutions

  • Professional Services works with customers on required system updates

  • Annual regulatory updates and forecasts are a fixture at each year’s Bridgeway Users Group Conference

What is SOC 2 Type II and why do you need it?

Bridgeway is the first Taft-Hartley technology provider to offer customers the reassurance that comes with hosting your applications in a SOC 2 Type II certified secure data center, which requires rigorous annual auditing by an independent third party. To award this important stamp of approval, auditors examine Bridgeway on four essential criteria: Security, Availability, Processing Integrity, and Confidentiality and Privacy. The designation is issued by the American Institute of Certified Public Accountants (AICPA). Learn more here.



average uptime for Bridgeway hosted applications, consistently exceeding our 99% uptime guarantee


terabytes of data restored within 18 hours during our 2017 Disaster Recovery preparedness test


average number of regulatory updates provided to affected customers each year since ACA introduction in 2010


average black market value per record of Personally Identifiable Information (PII)

Protect Your Members ebook

Download our free ebook
Protect Your Members:
Data Security Best Practices
for Benefits Administrators

Is your technology keeping your data secure?

There’s an alphabet soup of data security acronyms – PKI, VPN, PHI, PII, IDS – and if you’re not up on the latest threats and protection strategies, your organization’s data could be at risk. Data breaches can come at a high financial cost, with regulatory penalties topping $1 million in some instances. But the greater risk is your members’ security and trust. Organizations and companies of all sizes and in all industries have found themselves the target of prying cyber thieves. If you are still using homegrown technology to administer benefits, you may be particularly at risk.

No system is completely impenetrable, but there are steps you can take to improve your odds. Having a technology partner you trust to safeguard your data and give you sound advice on data security best practices is an essential fiduciary responsibility for Taft-Hartley administrators and trustees.