Loading...
Security & Compliance2018-10-25T19:14:38+00:00

Secure application hosting and proactive regulatory monitoring

Confidence that your applications and data are always protected, available and compliant

shield your data

Lock Down Your Cloud

  • High availability cloud-based application hosting
  • Applications are protected in Taft-Hartley’s first SOC 2 Type II secure data center
  • Access your basys system from any secure internet connection, giving you flexibility to run your office in the way that makes the most sense for your operation and resources.
guy with servers

Stop Buying Hardware

  • Application hosting provides all hardware and operating system software for licensed applications
  • Includes installation, configuration, loading, testing and deployment of new hardware
  • Full encrypted application and database backups nightly
  • Hardware and related IT infrastructure updated regularly
data security

Monitor Your Data

  • HIPAA audit rules require you to know and control who accesses personal data in your system
  • Secure Enhanced Audit Logging (SEAL) from basys lets you track who is viewing, changing or accessing your data
  • Customer-configurable role-based access – you decide who accesses what records and files
checkbox guy

Trust Your Compliance

  • Basys Compliance Team tracks regulatory changes and proactively consults with affected customers on expected impacts and proposed solutions
  • Professional Services works with customers on required system updates
  • Annual regulatory updates and forecasts are a fixture at each year’s basys Users Group Conference

What is SOC 2 Type II and why do you need it?

Basys is the first Taft-Hartley technology provider to offer customers the reassurance that comes with hosting your applications in a SOC 2 Type II certified secure data center, which requires rigorous annual auditing by an independent third party. To award this important stamp of approval, auditors examine basys on four essential criteria: Security, Availability, Processing Integrity, and Confidentiality and Privacy. The designation is issued by the American Institute of Certified Public Accountants (AICPA). Learn more here.

basys by the numbers

0%

average uptime for basys hosted applications, consistently exceeding our 99% uptime guarantee

0

terabytes of data restored within 18 hours during our 2017 Disaster Recovery preparedness test

0

average number of regulatory updates provided to affected customers each year since ACA introduction in 2010

$0

average black market value per record of Personally Identifiable Information (PII)

Protect Your Members ebook

Download our free ebook
Protect Your Members:
Data Security Best Practices
for Benefits Administrators

Is your technology keeping your data secure?

There’s an alphabet soup of data security acronyms – PKI, VPN, PHI, PII, IDS – and if you’re not up on the latest threats and protection strategies, your organization’s data could be at risk. Data breaches can come at a high financial cost, with regulatory penalties topping $1 million in some instances. But the greater risk is your members’ security and trust. Organizations and companies of all sizes and in all industries have found themselves the target of prying cyber thieves. If you are still using homegrown technology to administer benefits, you may be particularly at risk.

No system is completely impenetrable, but there are steps you can take to improve your odds. Having a technology partner you trust to safeguard your data and give you sound advice on data security best practices is an essential fiduciary responsibility for Taft-Hartley administrators and trustees. Download our free ebook Protect Your Members: Data Security Best Practices for Benefits Administrators, for tips and advice from basys Chief Technology Officer Ron Rock, or contact us today to help you take a critical look at your current security and how it can be improved.

Powered by Americaneagle.com