Your Compliance Data — Fully Protected

At Kendall 2-Sided Targeted Workforce Platform, we understand that security and confidentiality are as critical as accuracy.

Your Business Is Your Data - We Keep It Secure

Our platform is built with a security-first framework designed to protect sensitive contractor, employee, and project information from the moment it is entered, stored, accessed, or exported. All sensitive data is encrypted, we are continuously monitoring and strengthening our infrastructure to exceed industry security standards – we continuously strengthen our infrastructure to exceed industry security standards.

We utilize enterprise-grade cloud resources, encrypted communication, and multi-layered security controls to ensure every document, report, and user activity remains confidential and protected.

Our Security Principles

Data Encryption

All data transmitted through our system is secured using 256-bit SSL/TLS encryption. Stored data is encrypted using AES-256, ensuring it is protected against unauthorized access and unreadable to anyone who attempts to intercept or breach it.

Secure Cloud Infrastructure

Our system is hosted on secure U.S.-based cloud servers with multiple data-center redundancies and 99.9% uptime. Continuous monitoring, automated backups, and advanced threat detection protect against data loss, service interruption, and unauthorized access.

Controlled Access & Authentication

We implement role-based access control, allowing each user to access only the information necessary to perform their tasks. Administrative dashboards allow authorized personnel to manage, grant, or revoke access in real time.

Compliance-Ready Architecture

Our platform is developed following U.S. Department of Labor data-handling guidelines. This ensures confidentiality, integrity, and full auditability across all system activities.

New Security Enhancements Being Implemented

To elevate our protection even further, we are introducing several updates modeled after industry-leading security systems:

Two-Factor Authentication (2FA) for All Users
All users will be required to enable 2FA, adding an additional layer of identity verification during login.

Users will be able to authenticate using:
This significantly reduces the risk of unauthorized access and account compromise.
vivid-capture-of-construction-site-showcasing-buil-2024-12-07-13-51-46-utc (1)-min

Improved Login Process

To streamline security and usability:

Account Security Framework

The platform’s authentication framework uses email credentials paired with two-factor verification to maintain strong account protection while keeping the login experience efficient. Centralized access ensures users can reach their associated services with consistent security controls across all touchpoints. The supporting interface structure reinforces this environment, combining usability with reliable verification standards to deliver a stable and secure sign-in process.

User Onboarding for the New Security System

Users will receive an email prompting them to complete the onboarding process. Timely onboarding is required to maintain uninterrupted platform access.
Before onboarding, we recommend:

Training & Support

Guides, support resources, and walkthrough videos are available to help your team transition smoothly to the new security enhancements.

Data Integrity & Audit Protection
Each entry, edit, and export action triggers a time-stamped record that verifies every instance for auditors from the Department of Industrial Relations or Federal agencies. Our validation and reporting tools minimize manual error, and assist contractors in the simultaneous feats of compliance and accurate data advocacy.
Privacy You Can Trust
We don’t sell client data. We don’t share client data. Ever. All client data, including employee information, wage determinations, and payroll reports, remains internal and strictly for supporting labor compliance.
Business Continuity & Backup
Automated daily backups are performed, and in the event of an outage, a disaster recovery system rapidly restores functionality. Each aspect of system performance, reliability, and data integrity is monitored continuously.
Security is a Shared Commitment
We ensure client data is protected by establishing safe data handling processes. We do this through user training, system guidelines, and real-time alerts, keeping every compliance record secure and ready for an audit.