Your Compliance Data — Fully Protected
At Kendall 2-Sided Targeted Workforce Platform, we understand that security and confidentiality are as critical as accuracy.
Your Business Is Your Data - We Keep It Secure
We utilize enterprise-grade cloud resources, encrypted communication, and multi-layered security controls to ensure every document, report, and user activity remains confidential and protected.
Our Security Principles
Data Encryption
All data transmitted through our system is secured using 256-bit SSL/TLS encryption. Stored data is encrypted using AES-256, ensuring it is protected against unauthorized access and unreadable to anyone who attempts to intercept or breach it.
Secure Cloud Infrastructure
Our system is hosted on secure U.S.-based cloud servers with multiple data-center redundancies and 99.9% uptime. Continuous monitoring, automated backups, and advanced threat detection protect against data loss, service interruption, and unauthorized access.
Controlled Access & Authentication
We implement role-based access control, allowing each user to access only the information necessary to perform their tasks. Administrative dashboards allow authorized personnel to manage, grant, or revoke access in real time.
Compliance-Ready Architecture
Our platform is developed following U.S. Department of Labor data-handling guidelines. This ensures confidentiality, integrity, and full auditability across all system activities.
New Security Enhancements Being Implemented
Two-Factor Authentication (2FA) for All Users
All users will be required to enable 2FA, adding an additional layer of identity verification during login.
- Email passcodes
- Authenticator apps
Improved Login Process
- Users will log in using a verified email address rather than a phone number or ID number.
- A single login will provide access to all associated accounts and products.
- New profile and dashboard interfaces will enhance the overall user experience once logged in.
Account Security Framework
The platform’s authentication framework uses email credentials paired with two-factor verification to maintain strong account protection while keeping the login experience efficient. Centralized access ensures users can reach their associated services with consistent security controls across all touchpoints. The supporting interface structure reinforces this environment, combining usability with reliable verification standards to deliver a stable and secure sign-in process.
User Onboarding for the New Security System
- Ensuring main contact information is up to date
- Whitelisting our system email domains
- Making sure your device or computer clock is synced correctly
Training & Support
Guides, support resources, and walkthrough videos are available to help your team transition smoothly to the new security enhancements.
