CheckPoint HR, LLC Edison, New Jersey Report on Controls Placed in Operation and Tests of Operating Effectiveness For the Period February 1, 2011, to October 31, 2011 CHECKPOINT HR, LLC TABLE OF CONTENTS Independent Service Auditor’s Report ........................................... 1 CheckPoint HR, LLC’s Assertion .................................................... 4 Description of CheckPoint HR, LLC’s System ............................... 6 Overview of Operations.................................................................................................................... 6 Background................................................................................................................................ 6 Overview of Services Provided.................................................................................................. 6 Scope of Report ......................................................................................................................... 6 Relevant Aspects of the Control Environment, Risk Assessment Process, Information and Communication Systems, and Monitoring Controls ......................................................................... 6 Control Environment .................................................................................................................. 6 Risk Assessment Process ......................................................................................................... 8 Information and Communication Systems ................................................................................. 8 Monitoring Controls ................................................................................................................. 10 Information Technology General Computer Controls .................................................................... 10 Payroll Processing Controls ........................................................................................................... 17 Subservice Organizations ........................................................................................................ 23 Complementary User Entity Controls ...................................................................................... 23 CheckPoint HR, LLC’s Control Objectives and Related Controls and McGladrey & Pullen, LLP’s Tests of Controls and Results of Tests ........................................................................................... 26 Control Environment, Risk Assessment and Monitoring ................................................................ 26 Computer Operations ..................................................................................................................... 28 Access Controls ............................................................................................................................. 31 System Development and Maintenance ........................................................................................ 35 Application Controls ....................................................................................................................... 36 Operational Controls ...................................................................................................................... 37 Other Information Provided by CheckPoint HR, LLC .................. 44 State of Massachusetts Data Protection Law (201 CMR 17.00) ................................................... 44 Business Continuity Planning ........................................................................................................ 44 Independent Service Auditor’s Report CheckPoint HR, LLC Edison, New Jersey To the Management of CheckPoint HR, LLC Scope We have examined CheckPoint HR, LLC’s description of its payroll processing services for user entities’ transactions throughout the period February 1, 2011, to October 31, 2011 (“description”), and the suitability of the design and operating effectiveness of controls to achieve the related control objectives stated in the description. The description indicates that certain control objectives specified in the description can be achieved only if complementary user entity controls contemplated in the design of CheckPoint HR, LLC’s controls are suitably designed and operating effectively, along with related controls at the service organization. We have not evaluated the suitability of the design or operating effectiveness of such complementary user entity controls. CheckPoint HR, LLC uses subservice providers for processing payroll taxes and for hosting the production servers for the CheckPointHRMS application. CheckPoint HR, LLC uses Ceridian Corporation and Empower Software Solutions, Inc. for the payment of payroll taxes on their clients’ behalf. CheckPoint HR, LLC also uses AT&T, Inc. to host the production servers for the CheckPointHRMS application. The description indicates that certain control objectives specified in the description can be achieved only if controls at the subservice organizations contemplated in the design of CheckPoint HR, LLC’s controls are suitably designed and operating effectively, along with related controls at the service organizations. We have not evaluated the suitability of the design or operating effectiveness of such subservice organization controls. Service Organization’s Responsibilities In Section II of this report, CheckPoint HR, LLC has provided an assertion about the fairness of the presentation of the description and suitability of the design and operating effectiveness of the controls to achieve the related control objectives stated in the description. CheckPoint HR, LLC is responsible for preparing the description and for the assertion, including the completeness, accuracy and method of presentation of the description and the assertion, providing the services covered by the description, specifying the control objectives and stating them in the description, identifying the risks that threaten the achievement of the control objectives, selecting the criteria, and designing, implementing and documenting controls to achieve the related control objectives stated in the description. Service Auditors’ Responsibilities Our responsibility is to express an opinion on the fairness of the presentation of the description and on the suitability of the design and operating effectiveness of the controls to achieve the related control objectives stated in the description, based on our examination. We conducted our examination in accordance with attestation standards established by the American Institute of Certified Public Accountants. Those standards require that we plan and perform our examination to obtain reasonable assurance about whether, in all material respects, the description is fairly presented and the controls were suitably designed and operating effectively to achieve the related control objectives stated in the description throughout the period February 1, 2011, to October 31, 2011. An examination of a description of a service organization’s system and the suitability of the design and operating effectiveness of the service organization’s controls to achieve the related control objectives stated in the description involves performing procedures to obtain evidence about the fairness of the presentation of the description and the suitability of the design and operating effectiveness of those controls to achieve the related control objectives stated in the description. Our procedures included assessing the risks that the description is not fairly presented and that the controls were not suitably designed or operating effectively to achieve the related control objectives stated in the description. Our procedures also included testing the operating effectiveness of those controls that we consider necessary to provide reasonable assurance that the related control objectives stated in the description were achieved. An examination engagement of this type also includes evaluating the overall presentation of the description and the suitability of the control objectives stated therein, and the suitability of the criteria specified by the service organization and described in Section III of this report. We believe that the evidence we obtained is sufficient and appropriate to provide a reasonable basis for our opinion. Inherent Limitations Because of their nature, controls at a service organization may not prevent, or detect and correct, all errors or omissions in processing or reporting. Also, the projection to the future of any evaluation of the fairness of the presentation of the description, or conclusions about the suitability of the design or operating effectiveness of the controls to achieve the related control objectives is subject to the risk that controls at a service organization may become inadequate or fail. Opinion In our opinion, in all material respects, based on the criteria described in CheckPoint HR, LLC’s assertion in Section II of this report: a. The description fairly presents the payroll processing services that was designed and implemented throughout the period February 1, 2011, to October 31, 2011. b. The controls related to the control objectives stated in the description were suitably designed to provide reasonable assurance that the control objectives would be achieved if the controls operated effectively throughout the period February 1, 2011, to October 31, 2011, and user entities applied the complementary user entity controls contemplated in the design of CheckPoint HR, LLC’s controls throughout the period February 1, 2011, to October 31, 2011, and subservice organizations applied the controls contemplated in the design of CheckPoint HR, LLC’s controls throughout the period February 1, 2011, to October 31, 2011. c. The controls tested, which, together with the complementary user entity controls referred to in the scope paragraph of this report, and the subservice organization’s controls referred to in the scope paragraph of this report, if operating effectively, were those necessary to provide reasonable assurance that the control objectives stated in the description were achieved and operated effectively throughout the period February 1, 2011, to October 31, 2011. Description of Tests of Controls The specific controls tested and the nature, timing and results of those tests are listed in Section IV of this report. CheckPoint HR, LLC has included information about its payroll processing services in Section V. Other Information Provided by CheckPoint HR, LLC. This information has not been subjected to the procedures applied in the examination of the payroll system, and accordingly, we express no opinion on it. Restricted Use This report, including the description of tests of controls and results thereof in Section IV of this report, is intended solely for the information and use of CheckPoint HR, LLC, user entities of CheckPoint HR, LLC’s CheckPointHRMS application during some or all of the period February 1, 2011, to October 31, 2011, and the independent auditors of such user entities, who have a sufficient understanding to consider it, along with other information, including information about controls implemented by user entities themselves, when assessing the risks of material misstatements of user entities’ financial statements. This report is not intended to be and should not be used by anyone other than these specified parties. Schaumburg, Illinois December 7, 2011 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC CheckPoint HR, LLC’s Assertion We have prepared the description of CheckPoint HR, LLC’s payroll processing services for user entities during some or all of the period February 1, 2011, to October 31, 2011, and their user auditors who have a sufficient understanding to consider it, along with other information, including information about controls implemented by user entities of the system themselves, when assessing the risks of material misstatements of user entities’ financial statements. We confirm, to the best of our knowledge and belief, that a. The description fairly presents the payroll processing services made available to user entities of the system during some or all of the period February 1, 2011, to October 31, 2011, for processing their transactions. The criteria we used in making this assertion were that the description i. ii. presents how the system made available to user entities of the system was designed and implemented to process relevant transactions, including 1) The classes of transactions processed. 2) The procedures, within both automated and manual systems, by which those transactions are initiated, authorized, recorded, processed, corrected, as necessary, and transferred to the reports presented to user entities of the system. 3) The related accounting records, supporting information, and specific accounts that are used to initiate, authorize, record, process, and report transactions; this includes the correction of incorrect information and how information is transferred to the reports presented to user entities of the system. 4) How the system captures and addresses significant events and conditions, other than transactions. 5) The process used to prepare reports or other information provided to user entities’ of the system. 6) Specified control objectives and controls designed to achieve those objectives. 7) Other aspects of our control environment, risk assessment process, information and communication systems (including the related business processes), control activities, and monitoring controls that are relevant to processing and reporting transactions of user entities of the system. does not omit or distort information relevant to the scope of the payroll processing services, while acknowledging that the description is prepared to meet the common needs of a broad range of user entities of the system and the independent auditors of those user entities, and may not, therefore, include every aspect of the payroll processing services that each individual user entity of the system and its auditor may consider important in its own particular environment. b. The description includes relevant details of changes to the service organization’s system during the period covered by the description when the description covers a period of time. c. The controls related to the control objectives stated in the description were suitably designed and operated effectively throughout the period February 1, 2011, to October 31, 2011, to achieve those control objectives. The criteria we used in making this assertion were that Page 4 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC i. the risks that threaten the achievement of the control objectives stated in the description have been identified by the service organization; ii. the controls identified in the description would, if operating as described, provide reasonable assurance that those risks would not prevent the control objectives stated in the description from being achieved; and iii. the controls were consistently applied as designed, including whether manual controls were applied by individuals who have the appropriate competence and authority. Page 5 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Description of CheckPoint HR, LLC’s System Overview of Operations Background CheckPoint HR, located in Edison, New Jersey, is a limited liability company formed in 2001. This entity is owned by a holding company, CheckPoint HR Holdings Corp. As an administrative services organization (ASO), it provides a Web-based human resources (HR) management system (HRMS) called CheckPoint Human Resources Management System (CheckPointHRMS), which offers a solution to manage payroll and benefits administration, as well as other HR processes. CheckPoint HR also offers insurance through CheckPoint HR Benefits Group, an affiliate of CheckPoint HR, which offers clients benefits procurement backed by a sales team of licensed insurance brokers. CheckPoint HR employs approximately 60 full-time employees. Overview of Services Provided As an ASO, the CheckPointHRMS technology platform offers a solution to manage payroll and benefits administration, as well as other business-critical HR processes. CheckPoint HR’s centralized platform presents customers with a solution that offers employees HR self-service capabilities. CheckPointHRMS integrates aspects of HR, from recruitment, skills validation, background checks and training, to employee termination processes, such as COBRA administration. CheckPoint HR partners with CheckPoint HR Benefits Group. As a licensed insurance agency, CheckPoint HR Benefits Group’s benefits procurement complements CheckPoint HR’s payroll and benefits administration. CheckPointHRMS offers a platform that integrates the services it provides onto one portal, giving customers access to the CheckPoint HR website with no hyperlinking to other service providers or additional costs. CheckPointHRMS is the gateway to payroll and HR services in a single interface. CheckPointHRMS offers HR and payroll capabilities and utilizes role-based security, provides both manager and employee self-service, and has imaging and storage capabilities. Scope of Report The scope of the report includes the CheckPointHRMS technology platform, including the processing of employee payroll. Tax processing and data center hosting are not in scope for this report and are performed by subservice organizations. Relevant Aspects of the Control Environment, Risk Assessment Process, Information and Communication Systems, and Monitoring Controls Control Environment Organization The key individuals responsible for the daily operations of CheckPoint HR include: Individual Position Tim Padva Neil Friedman Mike Gorker Douglas Booth President, Chief Operations Officer, Chief Executive Officer (CEO) Chief Financial Officer (CFO) Chief Technology Officer, Chief Security Officer Vice President, Operations Page 6 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Management meets regularly to review and approve strategic planning and policies, and to monitor CheckPoint HR’s daily activity. Management plans and budgets on an annual basis. The CheckPoint HR organization is categorized into the following functional departments: Operations HR Finance New business implementation Marketing Benefits operations Sales Corporate training Administration CheckPoint HR has a policy charter that defines the requirements for approval and enforcement of entitylevel policies and departmental procedures. Company policies are utilized by the organization to communicate management’s decisions throughout the organization. Written procedures are used to document the processes used by individual departments for day-to-day activities. Policies are maintained in a change-controlled database. Human Resources CheckPoint HR believes that hiring the best-qualified individuals contributes to the overall strategic success of CheckPoint HR. Employees are hired to make significant contributions to CheckPoint HR. CheckPoint HR maintains personnel policies and procedures in the Employee Handbook. The handbook is available to employees on CheckPoint HR’s intranet. CheckPoint HR has documented a code of business ethics and conduct as part of the Employee Handbook. The Employee Handbook is approved by management, and employees sign an acknowledgement of the policies when they are hired and when the handbook is revised by management. Current job descriptions exist that describe primary job functions and responsibilities. CheckPoint HR attempts to attract and retain highly skilled business professionals specializing in the fields of finance, business administration and information technology (IT). Employee job descriptions, which include a position summary and describe major duties and responsibilities, are developed by the department managers. CheckPoint HR performs employment screening and new employee orientation. The new hire orientation reviews the policies in the orientation. Information security and client data confidentiality are covered in the orientation training. Reference and criminal background checks are performed on prospective employees prior to employment for CheckPoint HR positions. A policy regarding confidentiality is included in the Employee Handbook. Employees are cross-trained, where practical, to provide sufficient backup in the event of unexpected illness, termination, resignation or promotion. Page 7 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Employees are removed from their positions when terminated or discharged. Passwords, physical access keys and electronic access devices are obtained from terminated employees. An employee profile sheet is given to information systems upon termination. CheckPoint HR has developed a Use of Technology Policy, which communicates to employees their responsibilities for maintaining the security of confidential information and customer data. Employees are required to sign the policy when they are hired and on an annual basis thereafter. Risk Assessment Process The principal partners of CheckPoint HR assess the business risks facing the organization on a continuous basis. Regular meetings are held to informally assess risks and to develop business strategies to mitigate risks faced by the organization. Information and Communication Systems CheckPoint HR provides companies with cost-effective HR outsourcing and payroll outsourcing solutions to help them better manage their human capital. The centerpiece of this system is CheckPointHRMS, based on Ultimate Software, Inc.’s UltiPro software, which is an application service provider/SQL serverbased system. CheckPoint HR extends the functionality by hosting the application and processing payroll and HR data entered into the system by clients. Page 8 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC The following diagram depicts a summary of the flow of transactions: Page 9 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Monitoring Controls Management Monitoring Senior management meets regularly with the employees of the CheckPoint HR business units to assess the performance of the organization and to monitor the general activities of the departments. The financial statements are prepared by the controller and reviewed by the CFO. Journal entries and maintenance of the financials are executed by the finance department and activity is reviewed regularly by the controller and CFO. Monthly reports are prepared and the reports are reviewed by the board of directors six times per year (i.e., every two months). Client Monitoring CheckPoint HR has a client advisory board that consists of client representatives, selected annually, to provide feedback and guidance on how CheckPoint HR can better serve their clients’ interests and take an active role in the future development of the CheckPointHRMS application and the services provided by CheckPoint HR. The advisory board meets annually in the fall at CheckPoint HR’s headquarters in Edison. An annual survey is presented to the members of the client advisory board, and the results are published to assist in determining new services and application functionality. Service Provider Oversight CheckPoint HR has a Vendor Management Policy and a Vendor Management Program in place. The CFO reviews third-party relationships annually and obtains service auditor reports from critical service providers. External Audit CheckPoint HR undergoes an annual financial statement audit by a public accounting firm. Information Technology General Computer Controls Computer Operations The IT department’s operational tasks are performed during normal business hours, Monday through Friday, from 9:00 a.m. to 5:30 p.m. Members of the IT department are responsible for the completion of nightly processing and preparation of backup tapes for off-site storage. Environmental controls have been implemented at the Edison offices and computer room to protect CheckPoint HR’s computer systems and data. Problem Management CheckPoint HR has put problem management processes in place to escalate repeat or high-severity incidents to the attention of management. CheckPoint HR uses the Epicor Information Technology Service Management (Clientele) tool to track incoming client-reported and internally reported incidents. Clients may report technical problems by contacting the customer service department. The customer service department will complete an incident report and will escalate the issue to the IT department if necessary. The customer service department phones are answered from 8:00 a.m. to 6:00 p.m., Monday through Friday. The IT department also maintains an on-call list with mobile phone numbers (available on the Company’s intranet) in the event that an issue needs to be escalated after hours. Recurring incidents or incidents that have an impact on the hosted CheckPointHRMS application are escalated and a Problem Report is completed. The IT department is responsible for Problem Reports. The chief information officer (CIO) reviews Problem Reports on a weekly basis. A biweekly meeting is held with the IT department to review closed problems that have occurred since the last meeting. Page 10 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC System Monitoring CheckPoint HR uses several tools to monitor the network components, operating systems and applications that make up CheckPointHRMS. Custom scripts and reports are used to measure the processing time for the CheckPointHRMS application on a weekly basis and to track metrics of system performance on an ongoing basis. The IPSwitch application is used to monitor internal systems, and the SiteScope service is used for monitoring systems from the Internet. Monitoring applications are configured to automatically notify the IT department via email of technical failures detected by the systems. WhatsUp Gold is also used to monitor general network connectivity to servers and network infrastructure components. A member of the IT department remains on-call after hours to respond to alarms received after business hours. Operations Schedules CheckPoint HR utilizes scheduled process checklists to control daily operational procedures performed by the IT department. Normal periodic operations (such as system backups, periodic backup testing, manual system log monitoring and antivirus updates) are scheduled through the use of the process checklists. Management monitors the successful completion of computer operations tasks on a weekly basis and keeps ongoing metrics on internal operations and system uptime. Operations Documentation Written operating instructions are prepared and used for major applications processed. These instructions cover normal operations, error message response actions and restart/recovery instructions. An operations manual provides instructions for the processing of systems and processes, including run instructions and error response procedures. Data Backup CheckPoint HR has a management-approved policy that governs the backup of production data and the rotation of media off-site for storage. Data from the AT&T-hosted data center is backed up on a daily basis. Data from the Edison computer room is stored on a disk drive and is backed up to tape on a weekly basis. On the weekend, two full backups are run. One is retained locally for quick recovery, and one is rotated to off-site storage. Every morning, the IT department verifies that backup jobs were completed successfully. A log is retained for tape drives, indicating job detail, success or failure, time taken to complete the backup, amount of data backed up, etc. A tape inventory is maintained to show the age and current location of backup tapes. Daily backups are stored locally and are not rotated off-site. Backup tapes are stored inside the Edison computer room and inside the locked cage at the AT&T hosted data center. Weekly backup tapes are rotated to off-site storage. The off-site storage location is located in a bank vault. Access to backup tapes is restricted to personnel who have access to the computer room. Environmental Controls CheckPoint HR’s primary systems (including the Web servers and the CheckPointHRMS application servers) are hosted by AT&T. CheckPoint HR’s Edison offices house backup data and internal financial processing systems for the application. The Edison facility has environmental controls in place to protect the computer room and the check processing room. A dry chemical fire extinguisher is present in the computer room and the check processing room. Servers are connected to a local uninterruptible power supply system, and the facility has smoke detectors throughout the building, which are monitored by the building’s facilities management department. Page 11 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Access Controls A security administrator has been designated to administer security, verify compliance with established security standards and routinely review Security Violation Reports. The CIO acts as CheckPoint HR’s security officer and oversees the activity of the security administrator. CheckPoint HR’s primary method of controlling user access is through Active Directory group policies. Access to databases and programs used in the processing of the CheckPointHRMS application are controlled through Active Directory group policies and security groups. The security administrator sets up user profiles for employees. Network administrators are responsible for setting up access to the network and applications for employees. Access Authorization Employees are granted access to computer systems and data in accordance with management’s specific authorization. The security administrator is responsible for validating that the user profiles for terminated employees are disabled in a timely manner. CheckPoint HR employees are promptly removed from the systems upon notice of a termination. The HR department initiates the termination process for employees. HR will coordinate with the manager who reports an employee transition and determine when their access will be removed (in the event of a termination or abrupt resignation, access is terminated upon notification). The IT department receives the Termination Form, and the system accounts are removed or scheduled for removal. These forms are also reviewed by the CIO and retained indefinitely. CheckPoint HR documents management’s authorization for access to systems through the use of an Access Request Form. This form is created by the HR department when an employee starts with the Company. The IT department is responsible for creating new employees’ accounts. Employees are assigned to an appropriate Active Directory group based on their role at the organization. Once the IT department has set up the new user, the Access Request Form is sent to the CIO for review and is retained indefinitely. Administrative and superuser access to computer systems and data is appropriately restricted to authorized personnel. Administrative rights are restricted to IT department personnel for network devices, operating systems and databases. Customer service department personnel have the ability to administer client accounts to provide support for CheckPoint HR’s clients. CheckPointHRMS The core of CheckPointHRMS is Ultimate Software, Inc.’s UltiPro system, run in a unique, hosted environment, licensed by Ultimate Software, Inc. Access to CheckPointHRMS is controlled through a role-based security system within the UltiPro application. The Web-based version of the application commonly used by clients is through an independent security module (also part of the UltiPro package). Access to the Citrix version of the application (primarily used by CheckPoint HR employees and a small group of clients) is through Active Directory authentication. Web-Based Access Control Web-based access is controlled within the UltiPro application. CheckPoint HR initially sets up an administrative user account for clients. After the initial setup, clients have the ability to do their own maintenance on the users who access their database. The Oasis system is an internal support system and reference database that has the ability to run reports on data replicated from UltiPro and is used in the back-end processing of payroll files and customer support. Access to Oasis is controlled through Active Directory authentication. Page 12 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC CheckPoint HR Traffic Automation System Access CheckPoint HR Traffic Automation System (CTAS) is a production control system utilized for batchprinting payroll checks and pay stubs. CTAS authentication is managed through Active Directory and through Windows folder permissions. In addition, there are two levels of security within the application that separate some of the duties that may be performed by the system. Operating System Access Active Directory is used for access control to the back-office pieces of CheckPointHRMS (including Oasis and CTAS) and for accessing the Citrix version of the UltiPro system. Users have a unique Active Directory account and are assigned to a specific security group. This group determines the level of operating system access and also determines which applications an individual will be able to access (UltiPro, CTAS, Oasis, Microsoft Dynamics and other internal applications). Access to Active Directory and to UltiPro is controlled through the use of password authentication. The global password policy in Active Directory is set as follows: A minimum length of eight characters is required. Password changes are forced by the system every 90 days. Complex passwords are required. A password history of 10 iterations is retained to prevent the reuse of passwords. User accounts are locked out of the system after five invalid login attempts. System Logs and Log Reviews CheckPoint HR is currently logging database access and monitoring the logs for unusual activity. Logs from the Active Directory domain controller, the SQL servers for UltiPro and other critical servers are collected and stored by the GFI Event Manager system. Logs are retained for at least 180 days. The system is also used to automatically notify the IT department of certain types of security-related events. The CheckPointHRMS application also has the ability to log user activity. The CIO reviews a list of individuals and clients who accessed the UltiPro application directly (through the locally installed application client or Citrix) on a weekly basis. The review is documented on the Weekly Security Checklist. Access Rights Reviews CheckPoint HR performs systems access reviews semiannually. Active Directory access and the UltiPro SQL database access rights are reviewed. A Security Review Worksheet is used to track changes that are made or issues identified during the review. Microsoft SharePoint is being used for a policy library and also stores completed Security Review Worksheets. Database Administration Database systems are secured from unauthorized access through the use of authentication mechanisms. Application accounts for database access use 12-character complex passwords. Database administrative passwords are maintained by the CIO and security administrator. Developers and other IT department personnel may automatically request read-only access (which is logged). Write access to the database for other personnel is restricted and is permitted when required by a scheduled or emergency change. Write access to databases is enabled by the CIO or security administrator. Page 13 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Remote Access Remote access is given to employees through Citrix. Dial-up access is not available. Citrix sessions are encrypted. A Web interface is used to log into Citrix. The Web interface utilizes Active Directory password parameters. No other remote access is available. Offline Programs and Data Access to the computer room protects tapes stored in Edison through the use of a magnetic lock. Tape rotations are handled by CheckPoint HR employees. Network Infrastructure CheckPoint HR has implemented security features on network infrastructure devices, including routers, switches and firewalls, to verify that authorized personnel are able to access the devices. Access to network infrastructure systems is restricted to members of the IT department. Routers, switches and firewalls are kept up to date with the latest vendor releases. Network systems logs are retained on a syslog server and the logs are reviewed daily by the IT department. Firewalls and Intrusion Prevention Systems CheckPoint HR has implemented firewalls to separate their systems from publicly accessible networks. Firewalls are in place at the Edison computer room and hosted data center to control access to computer systems at these locations. The firewalls have intrusion prevention systems enabled to reduce the risk of attacks on hosted systems from the Internet. Internal Vulnerability Assessment CheckPoint HR’s systems engineers perform regular scans of the internal network to verify that systems are appropriately secured and have the latest security patches installed. The results of the testing are reviewed by the CIO and necessary fixes are documented and implemented as soon as possible. External Vulnerability Assessment CheckPoint HR has a third party perform quarterly external vulnerability assessments to confirm that external-facing computer systems and network components are appropriately secured and have the latest security patches installed. External vulnerability assessments are also run after changes affecting the configuration of Internet-facing systems or the network infrastructure. The results of testing are reviewed by the CIO and security administrator; required changes are applied and then the test is rerun. Data Transmissions and Secure E-Mail Access to CheckPointHRMS is allowed over an encrypted connection, Hypertext Transfer Protocol Secure (HTTPS) or an encrypted Citrix session. A secure mail portal hosted by Postini is available for employees to encrypt emails. Employees are required to use encryption whenever personally identifiable information or other confidential information is transmitted over untrusted networks. Physical Security CheckPoint HR occupies a multistory building in Edison. Physical access to the facility and computer room is controlled through the use of a magnetic card-key entry system. Card readers are installed at the main entrance, employee entrances, the computer room and the rear exterior door. Physical access to the facility includes three exterior doors. The main door is locked throughout the day and after hours. Visitors are required to sign a visitor log located at the main desk of the reception area. Page 14 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Individuals are given a separate card-key to access the magnetically locked doors within CheckPoint HR. Other personnel are escorted throughout restricted areas of the facility and sign in and out on a visitor log. The keys and card-keys to CheckPoint HR’s facilities are retrieved from terminated employees prior to their departure. The CIO reviews physical access on a weekly basis and logs off-hours access to the premises. Information Disposal Shredders are placed throughout the facility, and paper documents and computer media containing confidential information or customer data are shredded and disposed of by a third-party service provider. The shred bins are kept locked and are opened by the service provider for disposal. Systems Development and Maintenance Programming resources are used for evaluating existing software or modifying and enhancing existing systems. The core of CheckPointHRMS, UltiPro, is not developed or modified by CheckPoint HR; it is a purchased application. The back-office processing features of CheckPointHRMS were developed in-house, but no new systems were developed during the opinion period. CheckPoint HR has change management policies and procedures in place to govern changes to applications and infrastructure systems. There are also acquisition procedures to govern the process for introducing new systems into CheckPoint HR’s infrastructure. CheckPoint HR uses standard operating software without modification. The programming staff at CheckPoint HR does not modify operating software, but IT support analysts apply new releases and fixes to the operating system as they become available and are needed. The core application software of CheckPointHRMS (UltiPro) is not modified by CheckPoint HR. The IT department applies new release and fixes to the application as they become available and are needed. CheckPoint HR develops applications that interface with UltiPro. These applications are developed in-house, and releases are controlled. Releases are tested and approved by management prior to implementation. CheckPoint HR has procedures in place defining the requirements for change control that document new systems requests, require approval by an authorized user and are reviewed by programming management and prioritized by a management committee. Project Management CheckPoint HR uses a Project Request Form for programming changes requiring more than four hours of developer time. Project requests are reviewed by the CIO, and, if approved, a Clientele Request for Change (RFC) is completed to document the specific actions required for the project. Program Change Management The Clientele system is used to track the IT project that is approved for development. Changes requiring less than four hours of labor are entered directly into Clientele. After program changes are tested, the CIO documents his approval in the Clientele system. The Clientele RFC form documents the following: Date opened Date closed Approver Owner/implementer Page 15 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Infrastructure Change Management Changes to the network infrastructure or operating systems are also tracked using an RFC form and a Microsoft SharePoint workflow system. These changes do not necessarily have an initiator on the business side, but they are approved by the security administrator or CIO prior to implementation. If impact to the application functionality is possible, clients will be notified of the activity. Emergency Changes When an emergency change is required, it may be executed without the completion of an RFC form. The documentation will be completed after the change is completed. A verbal approval is required from the CIO before the emergency change is performed by the IT department staff. An incident report in Clientele may also be completed if a production issue was the reason for the performance of the emergency change. Source and Object Code A dedicated development environment is used for development activities. There is also a test environment for the quality assurance (QA) process and CheckPoint HR’s production environment. Once the testing is completed, the change is approved and a deployment is scheduled, a separate team within the IT department is responsible for moving source code from the test environment to the production environment. Program Testing Program changes are tested prior to the deployment to production. Testing is executed by the developer and the initiator of the change. CheckPoint HR does not have a dedicated QA team. A test script is developed based on the program change request. The programmer performs unit testing. The next level of testing is user acceptance testing. Changes are implemented after testing activities are completed. Controls Over Production Programs The IT department moves new and revised program modules to the production libraries when authorized. Once testing is completed and the requestor has signed off on the change, the IT department moves the modified program(s) to the production libraries. Notifications of changes are conveyed to clients when the change could potentially impact the clients. Documentation CheckPoint HR does not produce or maintain hardware or operating system documentation. Standard documentation related to hardware and operating systems is prepared by the vendors of the systems or equipment and maintained by CheckPoint HR for reference purposes. Internal technical documentation is prepared for the support of CheckPointHRMS and is available to authorized personnel. Risk Ratings A risk assessment is performed for proposed changes. The risk assessment is performed through discussion at the change control meeting, where the IT department and management discuss the potential impact of proposed changes. The conclusion is documented on the RFC form. The risk assessment is used to determine what degree of testing and postimplementation review is required for changes. Page 16 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Payroll Processing Controls Application Controls Payroll information is received by CheckPoint HR directly from clients through CheckPointHRMS. Clients use a Web browser to access CheckPointHRMS and log in using a user ID and password that connects securely utilizing HTTPS. The system locks users out after six invalid access attempts. Users are also required to change their passwords upon their first login to the system. Payroll submissions and other input also use HTTPS throughout the duration of the session. Input to the CheckPointHRMS payroll consists of payroll data pertaining to an employee’s hours or earnings for the current period and master file maintenance, including input related to new hires, updates to existing employees’ data or changes to the Company’s master data. Authorized client users can upload timesheets and make changes to the employee master file. Access to CheckPointHRMS is controlled by a role-based security system. Security access levels are set up within CheckPointHRMS using predefined security classes for different job functions. Configurations of job functions for client users are provided to CheckPoint HR by clients in the initial implementation process. The security function setup is available for CheckPoint HR clients to review before their first payroll cycle. Individual user accounts are set up for client users according to client requests. Client users are assigned a unique user ID, password and rule set that governs access to the different facets of the CheckPointHRMS payroll system. User IDs with appropriate security access levels can upload timesheets, change employee master files and process payroll transactions within their access limit. Authorized client users download the payroll timesheet template from CheckPointHRMS, input employees’ hours or earnings for the current period and upload the payroll timesheets for processing. The files uploaded and downloaded in the input process are encrypted for additional security. The ability to make changes to the employee master file through the Web interface is controlled by the role-based security system in CheckPointHRMS. Clients can communicate changes in their employee master file to CheckPoint HR customer service representatives over the phone or via emails. CheckPoint HR customer service representatives verify the identity of the caller and authenticate them against the list of authorized contacts maintained in the Oasis/Clientele systems. Change requests from authorized clients are input into the CheckPointHRMS payroll system. A client can review those changes made in the CheckPointHRMS payroll system, and it is the client’s responsibility to review changes in personnel made by CheckPoint HR and report errors. Changes to client employee payroll deductions are applied through the CheckPointHRMS Web interface by authorized client contacts. The ability to make changes in client employee payroll deductions is controlled by the role-based security system in CheckPointHRMS according to user roles defined by the clients. Payroll Processing Controls CheckPointHRMS is designed to process payroll-related transactions and to generate output that is used to produce employees’ paychecks, direct deposits, client invoices and related payroll reports. Payroll processing activities include: Processing payroll transactions, including payroll deduction and payroll tax Monitoring of customer payroll transactions Generating client invoices and transferring funds between client accounts, CheckPoint HR and the payroll tax third-party service provider Page 17 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Client Management Written procedures are in place for the setup and implementation of new clients and the maintenance and servicing of existing clients. New client setups are tracked and managed using the new client analysis spreadsheet. The CheckPoint HR New Business Development (NBD) Team obtains relevant client employee deduction information from CheckPoint HR’s clients and sets up the clients on CheckPointHRMS. Clients are responsible for reviewing the deduction setups in CheckPointHRMS for accuracy and completeness. CheckPoint HR client service representatives also process requests to add, modify or delete client-specified deductions when communicated by authorized client contacts. Authorized client contacts are recorded in CheckPoint HR’s internal Customer Relationship Management (CRM) database according to client specifications in the implementation phase. CheckPoint HR customer service checks the caller against a list of authorized contacts in the CRM system for changes to client employee payroll deductions made via telephone. It is CheckPoint HR’s clients’ responsibility to review the Master Control Report and Personnel Change Report, which are distributed upon payroll processing, to determine whether deduction information is complete and accurate and to notify CheckPoint HR when there is a change. Before a payroll transaction is committed to CheckPointHRMS, the system runs a Precheck Report. This process calculates gross pay and net pay based on client-defined deductions, showing what the entire check run will look like before the records are committed. It is the responsibility of CheckPoint HR’s clients to have proper controls for reviewing the Precheck Report and confirm the completeness and accuracy of client-specified deductions before committing the payroll transaction. Payroll Tax Processing The CheckPoint HR NBD Team obtains relevant tax information from clients and sets the clients up on the system and CheckPointHRMS. Setup is reviewed by the NBD Team, and the client’s existing payroll output is compared with the output from CheckPointHRMS. The NBD Team also reviews and observes the first month of processing to verify that the setup is complete and accurate. After the client setup process is complete, the client receives a company Tax Verification Report from CheckPoint HR, reviews the data, reports discrepancies and is then made responsible for authorization of the data contained in subsequent pay cycles. Changes to existing client tax setups are initiated through a phone call to CheckPoint HR’s customer service. Changes in the tax code for clients in CheckPointHRMS made by a customer service representative triggers a notification to CheckPoint HR’s finance department to review the change. A weekly review is performed to compare client tax code changes initiated by clients and client account changes in the tax system to verify the accuracy and completeness of client tax code changes. Tax Processing Once a client approves payroll records and commits those records, the system generates an invoice that creates the tax liability for the client’s current pay period. Once the tax application confirms the presence of an invoice/liability, a tax transmission file is generated and made available to the tax operator. The tax operator then utilizes the CheckPoint HR tax console to identify the files that need to be transmitted from CheckPointHRMS. The listing from the application is reconciled to the report of expected payrolls; variances are reviewed. Page 18 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Tax Reconciliation CheckPoint HR’s accounting staff finalizes the control by analyzing the general ledger. CheckPoint HR maintains a tax clearing account in its general ledger and reconciles tax drafts with tax billings to its clients on a daily basis. Variances are investigated and documented. At the end of the calendar quarter, CheckPoint HR’s tax staff generates a Quarterly Tax Balance Report for clients and sends the reports to the clients for their review. Tax updates are regularly applied to the payroll system. These updates are applied as part of the regular major/minor releases for the system. Calculation of Customer Invoices CheckPointHRMS calculates the invoice and produces direct deposit files and transmits the direct deposit information directly to ACH through CheckPoint HR’s National Automated Clearing House Association (NACHA) interface application. When a client submits a payroll transaction, the application creates a payroll invoice for the customer’s submission and populates the records into the invoice table of the Oasis database. The calculation of invoices is performed by a stored procedure according to predefined rules. The invoices include the client’s payroll tax liability, direct deposits (which are paid through CheckPoint HR’s cash management account), fees and other applicable charges. Invoices may also include the following: delivery, insurance premiums, 401(k) deductions, workers’ compensation premiums and garnishments. Clients agree to pay items on the CheckPoint HR invoice each pay period. Invoices are available in CheckPointHRMS to clients a few minutes after their payroll transactions are submitted. The invoice shows the detail on net pay, tax, deduction and fees. Customers can verify the amount of the invoice and report discrepancies to CheckPoint HR. Reconciliation of Invoices and Funds Transfers CheckPoint HR’s billing console generates the ACH file at night from invoices generated during the day. The treasury operator batches the ACH files for customer invoices and uploads them to the bank on their secure website via the NACHA console. In the morning, the bank provides online CheckPoint HR Bank Treasury Reports that detail the nightly processing results of the ACH files uploaded by CheckPoint HR during the previous day. Every morning, the CheckPoint HR finance department imports ACH files generated during the nightly job into Dynamics (CheckPoint HR’s financial reporting system). The CheckPoint HR finance department also imports invoices from the previous day into Dynamics. The invoice application automatically reconciles the UltiPro database figures generated by the client with the invoice prepared by CheckPoint HR. Any mismatches in the files generate an automated alert. The CheckPoint HR finance group performs a three-way reconciliation among the customer invoices, the ACH Files Reports and the Bank Treasury Reports to verify completeness and accuracy of client billing, as follows: The CheckPoint HR finance group performs a daily reconciliation of Invoice Reports (invoices generated during the previous day) and ACH File Reports in Dynamics to verify that the correct ACH files are generated completely and accurately based on customer invoices from the previous day. The CheckPoint HR finance group also performs a daily reconciliation of ACH reports and the Bank Treasury Report on the processing of ACH files from the previous day to verify that the bank has processed the previous day’s ACH transactions completely and accurately. Page 19 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Direct Deposit During payroll processing, the direct deposit payment information for the clients using the regular direct deposit service is written to a database in CheckPointHRMS and stored for transmission to the appropriate recipient. Regular direct deposit information is transmitted primarily to banks using CheckPoint HR’s NACHA interface system. Once a client approves payroll records and posts those records, the system generates an invoice that creates the direct deposit liability for the client’s current pay period. Once the direct deposit application confirms the presence of an invoice/liability, the NACHA interface generates a NACHA file and makes it available to the treasury operator. CheckPoint HR treasury staff utilize the direct deposit application to identify the NACHA files that need to be transmitted to the bank. Based on the pay date, the treasury operator batches the NACHA files and uploads them to the bank via their secure website. The treasury operator prints the Files Sent Report from the direct deposit application that details the individual files that have been transmitted to the bank, the amount of direct deposits to be paid and pay by date and client. Once the bank ACH validator verifies that the files are properly formatted, the NACHA file is batched and a Batch Summary Report is available to the treasury operator. The treasury operator reconciles the Bank Batch Summary Report to the Files Sent Report, and differences are investigated and documented. The reconciliation is signed off on by the treasury operator and submitted to the CFO for approval. The CFO verifies the totals and then signs off on the report, giving the treasury operator authorization to release the batches from the bank’s website for processing. Payroll Reports Upon completion of payroll, CheckPoint HR’s CTAS disburses the output to printers located in the distribution area. The output is divided into the following four categories: invoices, direct deposit vouchers, live checks and payroll reports. There is one printer designated for the category. Customers can request printing and delivery of the following payroll reports according to their preference: Accruals Check Register Check Register ALL PayGroups Dept Summary Dept Summary ALL PayGroups Draft Pay Master Invoice By Pay Group Invoice Draft Invoice Posted Pay Master Pay Master ALL PayGroups Pay Sheet Page 20 CHECKPOINT HR, LLC Tax Liability Tax Liability ALL PayGroups CPHR Invoice Detail Deductions by DedCode Detail Deductions by Employee Detail Pay Reg—MultiSort Earnings Detail for Balancing Employee PTO Balances INFORMATION PROVIDED BY CHECKPOINT HR, LLC During the print process, counters are used to verify that the reports are printed and that they contain the correct number of pages. If errors in the printing process are detected in the CTAS console, the errors are assigned to be investigated and resolved. Shipping instructions are collected during the implementation period. Shipping instructions for clients are stored in CheckPoint HR’s data repository. Shipping rules are stored in the CRM system, where they are built into a bar code that is generated at the end of the payroll transaction. The representative scans the bar code, which generates the FedEx label to ship the payroll package. Clients may make permanent or temporary changes to their shipping instructions, but the changes are supplied in writing by an authorized company representative. For clients who are paperless, the distribution representative places the printed invoice and payroll reports in a stack that is dropped in one of the locked shred bins within the Edison facility. The bins are emptied periodically by a third party and taken back to their shredding facility. The payroll reports generated are also available online through CheckPointHRMS. Customers can review these payroll reports a few minutes after they commit their payroll transaction through CheckPointHRMS for accuracy and completeness. Electronic Payment Systems CheckPoint HR utilizes an online banking system to process ACH and wire transfers. Access to the electronic payment system is restricted to authorized personnel. Wire transfers and drawdowns (reverse wires) require dual control for processing. ACH transactions are submitted through the online banking website, and then the totals for the ACH files are validated separately with the bank via telephone before the file is processed. These procedures apply to both ACH debits, where payroll funds are collected from clients, and credits where payroll is actually transmitted to clients’ employees. Monitoring of Payroll Transactions CheckPoint HR uses multiple tools to monitor the status of payroll transactions to verify the completeness and accuracy of customers’ payroll transactions. The following two primary tools used are the Process Automation Center (PAC) and CTAS: PAC is an integrated component of CheckPointHRMS used to monitor the customer’s input process, and CTAS is CheckPoint HR’s homegrown system that is used to monitor payroll processing and report generation. Monitoring of client input phases is performed by PAC, and the input steps of a customer creates an entry in the PAC monitoring console. If a step fails, an email notification is generated and sent to the initiator of the payroll transaction. PAC also monitors the precheck process. The operations group and customer service group can check the PAC monitoring console to investigate errors. A transaction log of submitted payroll transactions is kept in the PAC for investigation purposes. Page 21 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC CTAS processes and monitors invoice calculations, payroll report generation, and payroll checks and report prints. Customers’ payroll submissions create an entry in a log file that is displayed in the CTAS monitoring console in real time. The submission status, invoice printing status, checking printing status and status of other critical processing steps of the submission are written to related fields of the entry in the log and are displayed in the CTAS monitoring console in real time. A distribution representative working in the mailroom monitors the CTAS console and reports failed items to the IT department, who investigates the problem and documents the issue in the incident reporting system. Once the issue is resolved, the job is released and the status of the submission is updated to “complete” in the log file and the CTAS monitoring console. The billing console monitors payroll submissions by customer to verify the accurate generation of invoices. When a payroll transaction is completed and the payroll reports/checks are printed, a bar code is generated and printed on the cover of the package by CTAS. The distribution representative scans the bar code, which generates a FedEx label for shipping of the package. That usually means the completion of a payroll transaction, so the status of the transaction is updated as “completed” in the system. On a daily basis, a distribution representative reviews the database to check outstanding transactions that have been submitted but have not been completed to confirm that submissions are processed completely and successfully. The distribution representative also checks whether special requirements that are triggered by the various rules in the system are satisfied to confirm the completion of processing. Payroll Disbursement CheckPointHRMS is designed to process payroll and related transactions and to generate payments to employees in the form of paychecks or direct deposits. Checks or direct deposit advices are printed and delivered to clients or to the client’s employees directly. Upon completion of a payroll run, CTAS disburses the output to printers located in the distribution area. The output is divided into the following four categories: invoices, direct deposit vouchers, live checks and payroll reports. There is one printer designated for a category. The output is then collated based on the company code and pay group. If clients want the checks and direct deposits advise to be stuffed in the package, checks are run through the folding machine. The machine folds and inserts the stubs into the envelopes. Once the stubs are run through the machine, the counts are reviewed for accuracy. The pay stubs are batched, totaled and then reverified against the totals from the folding machine’s counter to confirm an accurate package. If counts are accurate, the distribution representative signs off on the header sheet. CheckPoint HR has controls in place to reduce the risk of theft and check fraud. The distribution area, where the checks are printed, is kept secured. A magnetic card-key is used to enter. Essential personnel have access to this room. The card-key reader system keeps an audit trail of individuals who access the check printing room. In addition, the room is under 24-hour surveillance. There are two security cameras that monitor the entrance and exit. The CIO is also in charge of physical security and verifies that physical security is maintained. Along with the physical security in the distribution area, CheckPoint HR has implemented security controls to protect the check stock. Live checks are printed with magnetic ink character recognition (MICR) toner on blank check stock. Checks have the following seven security features: Toner grip paper Micro print border (with CheckPoint HR) Fluorescent fibers Page 22 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Solvent-based ink eradicator reaction black dye Solvent-based ink eradicator reaction blue dye Bleach reactive brown stain multilanguage void (front) Fluorescent watermark Check stock and MICR toner are housed in the secured distribution area. CheckPoint HR monitors the use of MICR toner cartridges and ordering of new MICR toner cartridges. Shipping instructions are collected during the implementation period. Shipping instructions for clients are stored in CheckPoint HR’s data repository. Shipping rules are stored in the CRM system, where they are built into a bar code that is generated at the end of the payroll transaction. The distribution representative will scan the bar code, which generates the FedEx label to ship the payroll package. Clients may make permanent or temporary changes to their shipping instructions, but the changes are supplied in writing by an authorized company representative. CheckPoint HR uses FedEx for delivery of payroll packages. Once CheckPoint HR ships a package, FedEx sends an automated email to the client contact with the tracking number. Upon receipt, the contents become the sole responsibility of the client. Clients are expected to review the contents of the delivery and report variances when received. Variances are investigated. FedEx requires and keeps signatures of who signed for the package. Clients who elect to have their payrolls shipped via U.S. Postal Service follow a similar procedure. CheckPoint HR has elected to use the positive-pay security feature on the primary checking account used to issue payroll checks on behalf of its clients. Positive pay is the process of matching items on the company’s check issuance file against items presented for payment against its account. This matching process is performed daily to maintain control of possible fraudulent items presented on CheckPoint HR’s bank account. CheckPoint HR also offers the check writing service without the positive-pay feature. If a client elects to use one of the alternative banks, the possibility for fraudulent activity is accepted at the client’s own risk. Subservice Organizations CheckPoint HR uses subservice organizations to perform various functions to support the delivery of services. The scope of this report does not include the controls and related control objectives at the subservice organizations. The following is a description of services the subservice organizations provided: Subservice Organization Service Provided AT&T Data center hosting for the production environment Ceridian Tax processing for payroll taxes Empower Tax processing for payroll taxes Complementary User Entity Controls CheckPoint HR’s processing of transactions and the controls over the processing were designed with the assumption that certain controls would be placed in operation by user entities. This section describes some of the controls that should be in operation at user entities to complement the controls at CheckPoint HR. User auditors should determine whether user entities have established controls to provide reasonable assurance that: Page 23 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Contingency procedures are in place. If the services of CheckPoint HR were unavailable or inoperative due to system or communications failure, the user could expect some delay before the backup site used by CheckPoint HR is established. User organizations should establish procedures to verify continued operations during this interim period. Access control procedures are in place. CheckPoint HR’s user organizations are responsible for the following access controls: Granting and revoking appropriate payroll roles to their employees and notifying CheckPoint HR in the event of a change in administrative user roles Periodically reviewing the assigned login profiles of their employees for the payroll input systems Reviewing changes in personnel made by CheckPoint HR customer representatives and reporting any errors to CheckPoint HR in a timely manner Establishing proper controls over the use of IDs and passwords that are used to access and transmit payroll information Establishing strong password parameters for access to CheckPointHRMS (The system is capable of supporting minimum password lengths, password complexity and mandatory password changes. Clients are responsible for requiring strong password controls to protect the confidentiality and integrity of their data housed on the system.) Payroll data is transmitted accurately and is reviewed prior to submission to CheckPoint HR. CheckPoint HR’s user organizations are responsible for the following controls over the transmission and review of payroll data: Uploading or inputting payroll timesheets in accordance with the predefined CheckPointHRMS format Reviewing error messages that result from entering payroll data, addressing errors and resubmitting payrolls in a timely manner Reviewing the CheckPointHRMS Precheck Report on a timely basis to confirm that the payroll information has been recorded completely and accurately Reviewing the CheckPointHRMS Precheck Report in a timely manner to verify that the calculation of gross pay; withholding for federal, state, social security and local taxes; and net pay based on clientdefined deductions are complete and accurate Reviewing the email notification about payroll submission status Reviewing the reports available in CheckPointHRMS to verify the completeness and accuracy of the payroll transaction Page 24 CHECKPOINT HR, LLC INFORMATION PROVIDED BY CHECKPOINT HR, LLC Information submitted during the new client setup process is reviewed prior to submission to CheckPoint HR. The following controls over the setup of a new account with CheckPoint HR are the responsibility of the user organization: Reviewing the Master Control Form produced by CheckPointHRMS after the initial account setup (The Master Control Form provides a listing of the employees’ master records to verify that the employee-level and company-level information has been recorded completely and accurately.) Updating CheckPoint HR of changes to a user organization’s contact information in a timely manner Defining the distribution method for payroll packages and reports and communicating any required changes to CheckPoint HR in a timely manner Tax deductions are other tax processing information is reviewed for accuracy. The following controls over tax processing are the responsibility of the user organization: Completeness and accuracy of client-specified deductions Submitting client-specified deduction changes to CheckPoint HR in a timely manner Reviewing deduction and tax withholding information when previewing the Precheck Report before committing the payroll for processing Reviewing the Personnel Change Report (The Personnel Change Report is distributed upon payroll processing to determine whether deduction and tax withholding information is complete and accurate and to notify CheckPoint HR when there is a change.) Invoices, payroll data, and payroll packages are reviewed during each pay period. The following controls over the receipt of payroll packages and invoices are the responsibilities of user organizations: Reviewing the payroll invoice after submitting payroll transactions and reporting any errors to CheckPoint HR in a timely manner Reviewing the payroll invoice and reconciling the invoice with their bank statement to verify that the right amount of funds has been transferred to CheckPoint HR Reviewing the completeness and accuracy of the reports that are produced by CheckPointHRMS Reviewing the payroll package and reporting any variances when noted Defining and reviewing the accuracy of setup of direct deposit information provided to CheckPoint HR Page 25 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS CheckPoint HR, LLC’s Control Objectives and Related Controls and McGladrey & Pullen, LLP’s Tests of Controls and Results of Tests CheckPoint HR’s control objectives and related controls are an integral part of management’s description and are included in this section for presentation purposes. McGladrey & Pullen, LLP included the description of the tests performed to determine whether the controls were operating with sufficient effectiveness to achieve the specified control objectives and the results of tests of controls, as specified below. Tests of the control environment, risk assessment, information and communication, and monitoring included inquiries of appropriate management, supervisory and staff personnel, observation of CheckPoint HR’s activities and operations, and inspection of CheckPoint HR documents and records. The results of those tests were considered in the planning the nature, timing and extent of McGladrey & Pullen, LLP’s testing of the controls designed to achieve control objectives. As inquiries were performed for substantially all of CheckPoint HR’s controls, the tests were not listed individually for every control listed in the tables below. Control Environment, Risk Assessment and Monitoring Control Objective 1: Controls provide reasonable assurance that HR policies are in place to manage the hiring of employees. Provided by CheckPoint HR, LLC Control Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results 1.1 Checkpoint HR employees are provided a copy of the Employee Handbook upon hiring and when the Handbook is updated and are required to sign written acknowledge as evidence of handbook receipt. Inspected a sample of employee files to verify that employees signed an agreement to comply with the policies documented in the handbook. No exceptions noted. 1.2 Checkpoint HR employees are required to sign an employee confidentiality agreement (which is part of the handbook) upon employment. Inspected the nondisclosure agreement in the Employee Handbook to verify that the agreement included the confidentiality agreement language. No exceptions noted. Checkpoint HR performs background checks for perspective employees in sensitive positions (e.g., finance, IT) prior to employment. Inspected the personnel policies and procedures No exceptions noted. in the Employee Handbook to verify that background check procedures were documented. 1.3 Inspected a sample of employee files to verify a signed confidentiality agreement was on file. Inspected a sample of employee files to verify that a background check was on file for employees in sensitive positions. No exceptions noted. Page 26 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Control Objective 1: Controls provide reasonable assurance that HR policies are in place to manage the hiring of employees. Provided by CheckPoint HR, LLC Control 1.4 The Use of Technology Policy is distributed to employees, and employees sign a statement of compliance with the information security policies annually. Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results Selected a sample of employees and requested the signed statements of compliance with the IT policy; verified that the statements were completed upon hiring. No exceptions noted. Page 27 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Computer Operations Control Objective 2: Controls provide reasonable assurance that procedures are in place to detect hardware and software malfunctions and to notify management when they occur. Provided by CheckPoint HR, LLC Control Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results 2.1 Problem management processes are in place to escalate repeat or high-severity incidents to the attention of management. Inspected CheckPoint HR’s Incident Management Policy and Procedures to verify that processes were in place for identifying the root cause of incidents (problem management) and escalating the incidents to management. 2.2 Management uses custom scripts and reports to measure the processing time for the application on a weekly basis and to track metrics of system performance on an ongoing basis. Inspected a sample of weekly metrics reports No exceptions noted. prepared during the opinion period and verified that they tracked the performance of CheckPoint HR systems and applications throughout the period. 2.3 CheckPoint HR uses IPSwitch to monitor operating systems and servers internally and the SiteScope utility to monitor systems from the Internet for uptime, availability and system health. Observed CheckPoint HR network engineers accessing the console for the SiteScope and IPSwitch applications to verify that they were monitoring CheckPoint HR servers and applications. No exceptions noted. 2.4 CheckPoint HR has monitoring systems in place to notify IT personnel of any incidents after hours. Inspected the application configuration for WhatsUp Gold and IPSwitch to validate that it was configured to notify IT department personnel of incidents that occur after hours. No exceptions noted. No exceptions noted. Page 28 CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS CHECKPOINT HR, LLC Control Objective 3: Controls provide reasonable assurance that backups are performed on a regular basis and that storage media is regularly rotated off-site. Provided by CheckPoint HR, LLC Procedures Performed by McGladrey & Pullen, LLP Control 3.1 A written backup policy is in place that defines the requirements for the following: Test Performed Inspected the backup policy and verified that it included the following elements: Process for backing up data Process for backing up data Frequency of backups Frequency of backups Monitoring of backup jobs Monitoring of backup jobs Rotation of tapes off-site Rotation of tapes off-site Maintenance of a tape inventory Maintenance of a tape inventory Test Results No exceptions noted. 3.2 Client data is backed up on a daily Inspected a sample of backup logs and verified basis. that backups were performed daily and the jobs were completed successfully. No exceptions noted. 3.3 Backup tapes from both the Edison and third-party-hosted data centers are rotated to a secure off-site storage location on a weekly basis. Observed network administrators performing weekly tape backup rotations and preparing tapes for shipment to the off-site storage location. No exceptions noted. Inspected a sample of backup tapes in the off-site bank vault and compared it to the tape inventory to verify that that tapes that were marked as rotated off-site were stored in the bank vault. No exceptions noted. A tape inventory is maintained to show the age and current location of backup tapes. Inspected a sample of backup tapes in the off-site bank vault and compared it to the tape inventory to verify that the tapes that were marked as rotated off-site were stored in the bank vault and that the tapes were labeled with the date that they were originally run. No exceptions noted. 3.4 Page 29 CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS CHECKPOINT HR, LLC Control Objective 4: Controls provide reasonable assurance that the data centers are adequately protected by environmental controls. Provided by CheckPoint HR, LLC Procedures Performed by McGladrey & Pullen, LLP Control 4.1 4.2 The Edison computer room has environmental controls in place to protect the computer system and data stored at the facility. The check processing area has a dry chemical fire extinguisher and smoke detectors to protect the facility. Test Performed Observed the following environmental controls at the Edison computer room and noted that CheckPoint HR’s systems were protected by these controls: Temperature and humidity controls Dry chemical handheld fire extinguishers Local uninterruptible power supply systems connected to servers Observed that a dry chemical fire extinguisher and smoke detector were present in the check processing room. Test Results No exceptions noted. No exceptions noted. Page 30 CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS CHECKPOINT HR, LLC Access Controls Control Objective 5: Controls provide reasonable assurance that logical access to computer systems and data is granted and reviewed in accordance with management’s authorization. Provided by CheckPoint HR, LLC Procedures Performed by McGladrey & Pullen, LLP Control 5.1 5.2 Employees are granted access to computer systems and data in accordance with management’s specific authorization. Access to computer systems and data is removed upon notification when employees are terminated or leave the organization. Test Performed Test Results Selected a sample of new employees and inspected their Access Request Forms to verify that the access granted was approved by management. No exceptions noted. Inspected a sample of IDs from Active Directory and verified that they were authorized by management. No exceptions noted. Selected a sample of terminated employees and No exceptions noted. requested a copy of their Termination Checklists. Inspected the checklists and verified that access to computer systems and facilities was removed. Inspected the user lists for Microsoft Windows and verified that terminated employee accounts were removed from the system and that remote access was disabled. No exceptions noted. 5.3 Administrative access to computer Inspected the administrative accounts in Active No exceptions noted. systems and data is appropriately Directory and verified that they were assigned to restricted to authorized personnel. authorized personnel or were documented as service or application accounts. 5.4 Access rights to computer systems are reviewed semiannually to verify that authorized personnel are able to access the systems and applications. 5.5 5.6 Inspected a sample of semiannual access rights No exceptions noted. reviews performed by the CIO and verified that the following items were reviewed: List of Active Directory users SQL user accounts Penetration test results Server and firewall logs from the production environment are forwarded to a separate system for retention and are retained for a period of at least 60 days. Inspected the configuration of the log retention systems and verified that they were storing logs for at least 60 days. No exceptions noted. Inspected the Active Directory domain settings and verified that auditing was enabled on the domain. No exceptions noted. The CIO reviews a list of individuals and clients who accessed the UltiPro application directly (through the locally installed application client or Citrix) on a weekly basis. The review is documented on the Weekly Security Checklist. Selected a sample of Weekly Security Checklists and inspected the checklists to verify that the review of the UltiPro logs was completed by the CIO. No exceptions noted. Page 31 CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS CHECKPOINT HR, LLC Control Objective 5: Controls provide reasonable assurance that logical access to computer systems and data is granted and reviewed in accordance with management’s authorization. Provided by CheckPoint HR, LLC Procedures Performed by McGladrey & Pullen, LLP Control 5.7 Access to computer systems is controlled through the use of authentication mechanisms. Test Performed Inspected the password parameters for Microsoft Active Directory and noted the following requirements: Minimum length: eight characters Maximum age: 90 days Minimum age: zero days Require complexity: yes Password history: 24 iterations Test Results No exceptions noted. Page 32 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Control Objective 6: Controls provide reasonable assurance that infrastructure systems, including databases, firewalls and network components, are protected from unauthorized access. Provided by CheckPoint HR, LLC Control 6.1 Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results Firewalls are in place at the Edison and Piscataway data centers to control access to computer systems at these locations. Inspected a network diagram to verify that firewalls were in place in both the Edison computer room and the third-party-hosted data center. No exceptions noted. 6.2 The firewalls have intrusion prevention systems enabled to reduce the risk of attacks on hosted systems from the Internet. Inspected the configuration of the Cisco ASA No exceptions noted. firewalls at the Edison and Piscataway data centers and verified that the intrusion prevention system features were enabled and that the signature databases were up to date. 6.3 CheckPoint HR systems engineers perform regular scans of the internal network to verify that systems are appropriately secured and have the latest security patches installed. Inspected a report from the GFI LANguard system and verified that it was configured to monitor internal computer systems for the latest patches and software updates. No exceptions noted. 6.4 CheckPoint HR performs quarterly internal and external vulnerability assessments to verify that computer systems and network components are appropriately secured and have the latest security patches installed. Inspected a sample of quarterly internal vulnerability scans to verify they were completed. No exceptions noted. Inspected a sample of quarterly external vulnerability scans to verify they were completed. No exceptions noted. 6.5 Database systems are secured from unauthorized access through the use of authentication mechanisms. Users must authenticate through Active Directory and application accounts. Inspected the configuration of the databases for CheckPointHRMS (including the UltiPro database and the Oasis database for back-end processing) to verify that access was controlled through the use of Active Directory and was restricted to IT department personnel. No exceptions noted. 6.6 CheckPoint HR has a secure mail system in place so that employees can send encrypted emails to protect personally identifiable information. Inspected a test email sent by a systems engineer and verified that the email was delivered through an SSL-secured Web interface. No exceptions noted. Observed senior systems engineers log onto the No exceptions noted. firewalls at both locations and verified that they were operational and placed in accordance with the diagram. Page 33 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Control Objective 7: Controls provide reasonable assurance that physical access to the Edison facility and computer room is granted in accordance with management’s authorization. Provided by CheckPoint HR, LLC Control 7.1 Physical access to the Edison offices is restricted to authorized personnel. Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results Observed the physical security controls in place at the Edison facility to verify that an electronic card-key is required to enter the business area/server room and a monitoring security camera is installed in the server room. No exceptions noted. Inspected the list of individuals with access to No exceptions noted. the computer room and verified that access was restricted to authorized personnel. 7.2 Entrances and exits to the Edison facility and data center are protected by magnetic card-key readers. Toured the Edison facility and data center and observed that entrances and exits to the facility had magnetic card-key readers installed and that the readers were active and functioning. No exceptions noted. 7.3 Visitors are granted access into the front entrance by a receptionist, are authorized by an employee when visiting the facility and sign a visitor log. Observed the receptionist at the front entrance of the facility during business hours. No exceptions noted. Observed that a visitor log was maintained at the reception desk and that visitors had to be granted access by an authorized employee. No exceptions noted. 7.4 The CIO reviews physical access on a weekly basis and logs any off-hours access to the premises. Inspected a sample of weekly physical access review checklists and verified that physical access and off-hours access was reviewed. No exceptions noted. 7.5 Shred bins are placed throughout Observed the presence of shred bins throughout No exceptions noted. the facility to provide a way for the Edison office facility and attempted to open employees to dispose of the bins to verify that the bins were locked. confidential paper information and electronic media. A third-party service provider empties the bins and shreds the materials on a regular basis. Page 34 CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS CHECKPOINT HR, LLC System Development and Maintenance Control Objective 8: Controls provide reasonable assurance that changes to applications and infrastructure systems are documented, tested, approved and properly implemented. Provided by CheckPoint HR, LLC Procedures Performed by McGladrey & Pullen, LLP Control Test Performed Inspected the Vendor Selection Process to verify that it identified the requirements for selecting new systems, applications and vendors. Test Results 8.1 The Vendor Selection Process identifies the requirements for acquiring new systems and applications. 8.2 The Change Management Policy Inspected the Change Management Policy and governs modifications to computer verified that the policy governed changes to the systems and applications. computer systems and applications. No exceptions noted. 8.3 Changes to the computer systems and applications are documented using the Clientele system. The following elements are documented: Selected a sample of RFC forms and inspected them to verify that the documentation included: No exceptions noted. Date opened Date closed Approver Owner/implementer Date opened Date closed Approver Owner/implementer Inspected a sample of RFC forms and verified that testing was performed prior to implementation. No exceptions noted. 8.4 Program changes are tested prior to implementation. No exceptions noted. 8.5 After program changes are tested, Inspected a sample of RFC forms and verified the CIO documents his approval in that deployment to production was approved by the Clientele system. the CIO. 8.6 RFC forms are completed for infrastructure changes. Inspected a sample of RFC forms to verify that No exceptions noted. the infrastructure and operating systems follow a formal change management procedure. 8.7 A risk assessment is conducted for change requests that are completed. Inspected a sample of RFC forms and verified that a risk assessment was performed to determine the potential impact of the change on the operating environment. No exceptions noted. No exceptions noted. Page 35 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Application Controls Control Objective 9: Controls provide reasonable assurance that application security features are in place to reduce the risk of unauthorized access to the system. Provided by CheckPoint HR, LLC Control 9.1 Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results Users enter a user name to identify themselves when accessing the system and authenticate with a password when logging into the system. Logged on to the system and inspected the logon screen to verify that the system required the entry of a user name for access. No exceptions noted. 9.2 Passwords are masked when displayed on-screen by the system. Logged on to the system and inspected the login No exceptions noted. screen to verify that the password credential was masked when displayed on-screen. 9.3 When incorrect credentials (user name or password) are entered in the system, the rejection message does not identify which credential was invalid. Attempted to log on to the system using an invalid user name and inspected the system output to verify that the rejection message did not identify which credential was invalid. No exceptions noted. Attempted to log on to the system using an invalid password and inspected the system output to verify that the rejection message did not identify which credential was invalid. No exceptions noted. 9.4 The system locks out users after a six unauthorized access attempts, which constitute entering an invalid user name or password. Logged on to the system using an invalid user name and/or password and inspected the system output; verified that after six access attempts, the account was locked out. No exceptions noted. 9.5 After their first logon to the system, users are required to change their passwords. Logged on to the system using a newly created No exceptions noted. user account and inspected the system output to confirm that the system required that the password for the account be changed. 9.6 The system uses a role-based security system. Privileges are assigned at the group or global level and once configured cannot be modified at the individual level. Logged on to the system using a test user account and a test administrator account to verify that role-based security prevented users from accessing administrative functions. 9.7 Client payroll time sheets uploaded and downloaded in the payroll input process are encrypted for additional security. Observed the Web server settings to verify that No exceptions noted. SSL encryption software was in place during the upload and download process. Logged on to the system and inspected the login No exceptions noted. screen to verify that the system required a password for access. No exceptions noted. Page 36 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Operational Controls Control Objective 10: Controls provide reasonable assurance that policies and procedures are in place for the setup of new clients and the management of existing clients in the system. Provided by CheckPoint HR, LLC Control Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results 10.1 Written procedures are in place for the setup and implementation of new clients and the maintenance and servicing of existing clients. Inspected a checklist and verified that the client setup, implementation and maintenance procedures were in place and approved by management. No exceptions noted. 10.2 New client setups are tracked and For a sample of new clients, inspected that the managed using the new client client analysis was performed and documented analysis spreadsheet. on the client analysis spreadsheet. No exceptions noted. 10.3 Changes to the employee master file made via telephone are authenticated against a list of authorized contacts. Observed that the customer service No exceptions noted. representatives can access the predefined client contact information from the internal CRM system to authenticate the identity of the caller. For a sample of client employee master files changes by customer service representatives recorded in CheckPointHRMS, inspected the customer service tracking system records to determine whether they had been documented and were communicated by authorized client contacts. No exceptions noted. Page 37 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Control Objective 11: Controls provide reasonable assurance that payroll deductions and payroll taxes are processed completely and received from authorized sources. Provided by CheckPoint HR, LLC Control Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results 11.1 A Tax Verification Report is sent to new clients as part of the new client setup process. Inspected a sample of new clients to verify that CheckPoint HR sent the companies a Tax Verification Report for their review after the client setup process was complete. No exceptions noted. 11.2 Ceridian processes the tax transmission files and faxes back a report of tax drafts that will occur the next day for the taxes Ceridian will be paying. The report is reconciled to the CTS Files Sent Report. Differences are investigated, reconciled and documented. Inspected a sample of records to verify that the CheckPoint HR tax operator reviews the tax transmission file faxed from Ceridian on a daily basis. No exceptions noted. Inspected a sample of the CTS Files Sent Reports and Ceridian’s faxed tax transmission files to verify that differences in the two reports are investigated and documented. No exceptions noted. Page 38 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Control Objective 12: Controls provide reasonable assurance that funds transfer activities from clients to CheckPoint HR are complete and accurate. Provided by CheckPoint HR, LLC Control Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results 12.1 The finance department reconciles funds transfer activities on a daily basis, including Invoice Reports (invoices generated during previous day) and ACH File Reports in Dynamics to verify that the correct ACH files were generated based on customer invoices from the previous day. Inspected a sample of the daily reconciliation of No exceptions noted. Invoice Reports and ACH File Reports and verified that the reports were reconciled and that the correct ACH files were generated based on customer invoices from the previous day. 12.2 The CheckPoint HR finance department performs a daily reconciliation of ACH File Reports and the Bank Treasury Report. Inspected a sample of ACH File Reports and Bank Treasury Reports to verify that ACH reconciliations were performed accurately. No exceptions noted. Page 39 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Control Objective 13: Controls provide reasonable assurance that activity reports are available to clients through the application and are distributed on a quarterly basis. Provided by CheckPoint HR, LLC Control Procedures Performed by McGladrey & Pullen, LLP Test Performed Observed payroll reports produced by the UltiPro system. Test Results 13.1 The system-generated payroll reports are available online through CheckPointHRMS. No exceptions noted. 13.2 Invoice and payroll reports printed Observed the locked shred bins throughout the to hard copy during processing CheckPoint HR Edison facility and in the that are not delivered to clients for distribution and processing areas. review (e.g., for clients who elect to have electronic delivery of reports) are disposed of in a secure manner. No exceptions noted. 13.3 At the end of the calendar quarter, Inspected a sample of Quarterly Tax Balance CheckPoint HR’s tax staff Reports to determine the availability of these generates a Quarterly Tax reports to CheckPoint HR’s clients. Balance Report for clients from CTS and sends the reports to the clients for their review. No exceptions noted. Page 40 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Control Objective 14: Controls provide reasonable assurance that access to the electronic payment systems is restricted to authorized personnel. Provided by CheckPoint HR, LLC Control Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results 14.1 Management has developed written procedures for treasury management, including the processing of ACH transactions, wires and reverse wire transactions. Inspected written procedures to verify that formal processes were in place for ACH, wire and reverse wire transactions. No exceptions noted. 14.2 The banking system used to process ACH and wire transfer payments is restricted to authorized personnel. Inspected the user listing of the banking system to verify that access is restricted to current CheckPoint HR employees. No exceptions noted. 14.3 The banking system requires dual control for the approval of wire transfer. Inspected the configuration of the banking system and the Wire Transfer Policy to verify that dual control is required for the approval of wires. No exceptions noted. Observed the treasury manager attempt to No exceptions noted. initiate a wire transfer to a previously unused bank account to verify that the system would not allow it. 14.4 New accounts added to the wire Inspected the configuration of the online banking No exceptions noted. transfer system must be approved system and verified that new accounts added to by the CFO. the system for funds transfer required approval by the CFO. 14.5 Transmitted ACH files must be validated by telephone with the bank before they are processed. Observed operations personnel upload an ACH transaction to the banking website and verified that a telephone verification of the totals was required before the file was processed. No exceptions noted. Inspected output from the online banking No exceptions noted. application and verified that the file was processed only after the telephone verification of the ACH totals was performed. Page 41 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Control Objective 15: Controls provide reasonable assurance that payments to customer employees are processed completely and accurately and that security features are included on the physical checks used for payment. Provided by CheckPoint HR, LLC Control 15.1 Procedures Performed by McGladrey & Pullen, LLP Test Performed Test Results Live checks are printed with MICR Observed a check to verify that the seven No exceptions noted. toner on blank check stock. security features were present. Checks have seven security features: Observed the security features noted on No exceptions noted. CheckPoint HR payroll checks in the processing Toner grip paper and distribution room. Microprint border (displaying “CheckPoint”) Fluorescent fibers Solvent-based ink eradicator reaction black dye Solvent-based ink eradicator reaction blue dye Bleach reactive brown stain multilanguage void Fluorescent watermark 15.2 Check stock and MICR toner are housed in the secured distribution area. CheckPoint HR monitors the use of MICR toner cartridges and ordering of new MICR toner cartridges. Observed the security features of the check printers and check printing process. No exceptions noted. 15.3 The distribution room where the checks are printed is secured. A magnetic card-key entry system is used to protect the area. Access is limited to the Distribution Team, technical support personnel, senior management and the accounts payable payer. The distribution room is also under 24-hour surveillance by two security cameras that monitor the entrance and exit. Observed the physical security features of the distribution room, including the presence of cameras monitoring the room and the magnetic readers on the entrance and exit to the room. No exceptions noted. Inspected a list of the physical access permissions for the distribution room and verified that it was limited to the Distribution Team, technical support personnel, senior management and the accounts payable payer. No exceptions noted. Pay stubs are batched, totaled and then reverified against the totals from the folding machine counter to produce the payroll package. Observed the distribution representative verify the stuffing of checks and pay stubs to verify that the production procedures were followed, which included addressing out-of-sequence issues. No exceptions noted. 15.4 Page 42 CHECKPOINT HR, LLC CHECKPOINT HR, LLC’S CONTROL OBJECTIVES AND RELATED CONTROLS AND MCGLADREY & PULLEN, LLP’S TESTS OF CONTROLS AND RESULTS OF TESTS Control Objective 15: Controls provide reasonable assurance that payments to customer employees are processed completely and accurately and that security features are included on the physical checks used for payment. Provided by CheckPoint HR, LLC Control 15.5 15.6 Procedures Performed by McGladrey & Pullen, LLP Test Performed Shipping instructions are collected during the implementation period. Shipping instructions for clients are stored in CheckPoint HR’s data repository. Clients may make permanent or temporary changes to their shipping instructions, but the changes are supplied in writing by an authorized company representative. Observed a test payroll transaction and documentation of distribution settings, such as delivery address, delivery method and delivery schedule, to verify that the delivery was performed according to client specifications. The treasury operator prints the Files Sent Report from the direct deposit application, which details the individual files that have been transmitted to the bank, the amount of direct deposits to be paid, and what pay date and client they represent. The Bank Batch Summary Report is reconciled to the Files Sent Report. Differences are investigated and documented. This report is signed off on by the treasury operator and submitted to the CFO for approval. The CFO verifies the totals and then signs off on the report, giving the treasury operator authorization to release the batches from the bank’s website for processing. Inspected a sample of daily direct deposit reconciliations to verify that the Files Sent Report and the Bank Batch Summary Report were reconciled completely and accurately. Test Results No exceptions noted. Observe that a checklist of special shipping No exceptions noted. requirements exists in the system for the distribution representative to complete on a daily basis. No exceptions noted. Inspected a sample of daily direct deposit No exceptions noted. reconciliations and verified that the CFO approved the forms before the operator released the direct deposit batch for the bank to process. Page 43 CHECKPOINT HR, LLC OTHER INFORMATION PROVIDED BY CHECKPOINT HR, LLC Other Information Provided by CheckPoint HR, LLC The information included in this section of the report is presented by CheckPoint HR to provide additional information to user organizations and is not a part of CheckPoint HR’s description of controls placed in operation. The information in this section has not been subjected to the procedures applied in the examination of the description of controls related to the processing of transactions for user organizations and, accordingly, we express no opinion on it. State of Massachusetts Data Protection Law (201 CMR 17.00) CheckPoint HR takes the confidentiality of customer information seriously and has instituted an information security program to address the requirements of the Massachusetts data protection law enacted on March 1, 2010 (Mass 201 CMR 17: Standards for the Protection of Personal Information of Residents of the Commonwealth). CheckPoint HR has appointed an information security officer to oversee data protection requirements at the organization. The information security officer is responsible for maintaining the Information Security Policy, keeping the policy up to date, reporting violations of the policy to senior management, maintaining an incident response plan in case of a breach of security (as identified by Mass 201 CMR 17), documenting security incidents and escalating high-risk incidents to the attention of management and the board of directors. CheckPoint HR has written security policies for employees to identify their responsibilities for handling confidential information, including personally identifiable information. CheckPoint HR includes information security controls testing as part of their annual SOC 1, Type 2 engagement to verify the operating effectiveness of the security program in place at the organization. CheckPoint HR also conducts annual information security and privacy training for employees and reports to the board of directors annually on the status of the information security program. Business Continuity Planning The business continuity planning group is part of CheckPoint HR’s overall risk management process. With the addition of the new vice president of operations, the business continuity planning group now includes the Company’s CEO, CFO, CIO and vice president of operations. Risk management currently rests with the office of the CFO with traditional recovery services residing with the office of the CIO. Business continuity plans address the resumption of business processes and operational processing functions. Plans typically include procedures concerning: Notification of essential staff, vendors, clients, customers, etc. Organizational recovery efforts Relocation of operating functions Priority of work to be performed Protection of data Lists of essential resources needed by the business unit Page 44 CHECKPOINT HR, LLC Interrelationships of critical functions Restoration of records and files Essential resources for recovery/backup processing OTHER INFORMATION PROVIDED BY CHECKPOINT HR, LLC In order to maintain the readiness of the contingency plans, CheckPoint HR has the following requirements for the business units: Business units perform a validation of their business unit contingency plan at least annually. In addition, the plans are submitted to the office of the CFO. Business continuity plans for critical functions are validated in periodic recovery simulations. These are reviewed by internal random audits. The business continuity plans for key external service providers are examined periodically and where appropriate. Responsibility for this evaluation is assigned to the office of vendor management. Summary CheckPoint HR takes its obligation to use financially reasonable means to assure business continuity for the Company and its clients very seriously. However, the foregoing does not constitute a representation or warranty that certain events will not affect CheckPoint HR’s systems or that CheckPoint HR can achieve specific recovery times in the event of a disruption. This document is intended only to provide guidance as to CheckPoint HR’s recovery plans. Page 45
© Copyright 2026 Paperzz