intelliHR's System Access Control Policy explains how access to intelliHR systems and applications is limited for all users, including but not limited to workforce members, volunteers, business associates, contracted providers, and consultants. Access by any other entity is allowable only on a minimum necessary basis. All users are responsible for reporting an incident of unauthorized use or access to the organization's information systems. The purpose of this procedure is to provide a policy and guideline for creating, modifying, or removing access to the company’s network and data by creating, changing, or deleting the network account configuration for a User. This policy and the defined process is used to allow access to the company’s data and systems to team members who meet the requirements defined in this policy. This policy governs team members who are granted access that is necessary to support the business. This policy relates to all data used, processed, stored, maintained, or transmitted in and through the company’s systems.
Access Establishment and Modification
Requests for access to the intelliHR Platform systems and applications are made formally using the following process:
- An intelliHR team member initiates the access request by creating an Issue in the intelliHR ticketing system.
a.User identities must be verified prior to granting access to new accounts
b. Identity verification must be done in person where possible; for remote employees, identities must be verified over Google Meet, a Slack video call, or a phone call using a registered number c. For new accounts, the method used to verify the user's identity must be recorded on Issue - The Security Officer will grant or reject access to systems as dictated by the team members' job title. If additional access is required outside of the minimum necessary to perform job functions, the requester must include a description of why the additional access is required as part of the access request
- Prior to gaining access to systems, background verification checks on team members should be carried out in accordance with relevant laws, regulations, and ethics, and proportional to the business requirements, the classification of the information to be accessed, and the perceived risk
- Manager approvals are required for all team members
- If the request is rejected, it goes back for further review and documentation
- If the review is approved, the request is marked as Done, and any pertinent notes are added
Access Reviews
All access to intelliHR systems and services is reviewed and updated on a twice-yearly basis to ensure proper authorizations are in place commensurate with job functions. The process for conducting reviews is outlined below:
- The Security Officer initiates the review of user access by creating an Issue in the intelliHR Ticketing System
- The Security Officer is assigned to review levels of access for each intelliHR workforce member
- If user access is found during review that is not in line with the least privilege principle, the Security Officer may modify user access and notify the user of access changes
- Once the review is complete, the Security Officer then marks the ticket as Done, adding any pertinent notes required
Workforce Clearance
- The level of security assigned to a user to the organization's information systems is based on the minimum necessary amount of data access required to carry out legitimate job responsibilities assigned to a user's job classification
- All access requests are treated on a least-access principle
- intelliHR maintains a minimum necessary approach to access to Customer data
Unique User Identification
- Access to the intelliHR Platform systems and applications is controlled by requiring unique User Login IDs and passwords for each individual user and developer
- Password requirements mandate strong password controls
- Passwords are not displayed at any time and are not transmitted or stored in plain text
- Default accounts on all production systems, including root, are disabled
- Shared accounts are not allowed within intelliHR systems or networks
- Automated log-on configurations other than the company’s approved Password Management provider that store user passwords or bypass password entry are not permitted for use with intelliHR workstations or production systems
Automatic Logoff
- Users are required to make information systems inaccessible by any other individual when unattended by the users (for example, by using a password-protected screen saver or logging off the system)
Employee Workstation Use
All workstations at intelliHR are company owned, and all are laptop products running Windows, macOS, or Linux.
- Workstations may not be used to engage in any activity that is illegal or is in violation of the organization's policies
- Access may not be used for transmitting, retrieving, or storage of any communications of a discriminatory or harassing nature or materials that are obscene or "X-rated". Harassment of any kind is prohibited. No messages with derogatory or inflammatory remarks about an individual's race, age, disability, religion, national origin, physical attributes, sexual preference, or health condition shall be transmitted or maintained. No abusive, hostile, profane, or offensive language is to be transmitted through the organization's system
- Information systems and applications also may not be used for any other purpose that is illegal, unethical, or against company policies or contrary to the organization's best interests. Messages containing information related to a lawsuit or investigation may not be sent without prior approval
- Solicitation of non-company business, or any use of the organization's information systems/applications for personal gain is prohibited
- Users may not misrepresent, obscure, suppress, or replace another user's identity in transmitted or stored messages
- Workstation hard drives must be encrypted
- All workstations have firewalls enabled to prevent unauthorized access unless explicitly granted
Employee Termination/Offboarding Procedures
- The Human Resources Department, users, and their supervisors are required to notify the Security Officer upon completion and/or termination of access needs and facilitate completion of the "Termination Checklist"
- The Human Resources Department, users, and supervisors are required to notify the Security Officer to terminate a user's access rights if there is evidence or reason to believe the following (these incidents are also reported on an incident report and is filed with the Privacy Officer):
a. The user has been using their access rights inappropriately
b. A user's password has been compromised (a new password may be provided to the user if the user is not identified as the individual compromising the original password) - The Security Officer will terminate users' access rights within 1 business day of termination/separation and will coordinate with the appropriate intelliHR team members to terminate access to any non-production systems managed by those team members
- The Security Officer audits and may terminate access of users that have not logged into the organization's information systems/applications for an extended period of time.