At any time you can request the addition of additional modules or users by filling out the order online and making the payment.
The increase in the number of users extends to all modules owned, not just the new ones.
Similarly, the increase in the number of modules extends to all purchased users.
Once you have verified that your payment has been successful, you will receive an email notifying you of the activation of the modules and/or added users.
You do not have to worry about updating the software as this is automatic and free. This is one of the great advantages of the cloud. You’ll always be sure of using the latest version and you’ll be able to take advantage of the improvements that will be added at no extra cost.
The contract can be terminated at any time with a notice of 15 days on the expiration date indicated in the order, by sending a registered letter with the appropriate form, downloadable from the site, completed and signed by the person designated by the company to manage the contract.
The customer will receive a copy of all data of his property on the system updated to the date following the last day on which the customer has access to the service.
Once the termination of the contract is effective, the customer will no longer have access to the service.
On the website, in the area reserved for registered users, you will find the user manual and a series of video tutorials showing how to carry out the most frequent operations.
We can organize both distance learning courses on the use of the platform (e.g. webinars) and traditional classroom courses. Send us an email specifying your needs and we will contact you.
If you have not found the answer in the FAQ, you can contact our team by writing an email to firstname.lastname@example.org. The service is available from 9.00 am to 18.00 from Monday to Friday, excluding holidays. Write an email describing the problem possibly including a screenshot. A member of our team will process your request.
The user does not have the possibility to import data into HR-Assistant. However, we can offer you a technical data import service. Contact us if you would like more information.
The main modules of the system allow the data to be exported and saved on the user’s PC in various formats (e.g. excel, pdf, etc.). The type of data that can be exported depends on the role of the user. Users with a role other than the administrator have limited access to their own data.
It is possible to export attendance data and other data so that it can be transferred to the software used for the processing of payrolls. However, you must first check the format to be used with the payroll officer.
The system is compatible with most of the time attendance terminals on the market, which must be purchased separately. A specific optional module is also available to allow employees to clock-in and out online (web clocking).
The contract has a minimum annual duration and is automatically renewed unless notice of cancellation is given through the area reserved for registered customers or by mail with the appropriate form.
A cloud software does not require you to purchase the software. ‘Software as a service means that the software is made available already installed on a suitable hardware platform; in addition, the price includes a support and assistance service. The advantage of this mode is that you don’t have to worry about installation or updates, you can also access the application and your data from anywhere and using any device (PC, tablet, smartphone) When you subscribe to the service you can specify the application modules you want and the number of users who will access the application. All you need to use the software is an internet connection and a browser.
Security is our priority. With HR-Assistant, your data is always safe. We have put in place a set of security measures on multiple levels that are difficult for a company to set up autonomously.
The hosting infrastructure is located in secure data centers using all the latest electronic surveillance technologies as well as multifactor access control systems.
The data centers we use are protected 24 hours a day, 7 days a week from specialized security personnel and access is allowed only based on the principle of least privilege. Whenever a person leaves an area that contains customer data, they are inspected. The environmental systems are designed to limit the impact of downtime on operations.
The data centers are located in different geographical regions and areas of availability, so you get the best service even when service is interrupted in in a particular area, even if the cause is due to natural disasters or system failures.
The infrastructure is designed to provide optimal availability without sacrificing customer privacy and confidentiality.
HR-Assistant Human Resource Management was developed on a software platform designed for the highest security standards. The multi-level application architecture makes it possible to separate both logically and physically the presentation and execution level from the data access level in order to ensure the necessary controls before allowing access to the database.
Sophisticated security rules allow you to control which users can access each feature and data table up to the point of being able to control the individual actions allowed at the level of the individual record.
The security of access to the system is achieved through various measures, such as:
- Authentication through username and password transmitted by SSL encrypted protocols, the password choice must pass a strength verification test, password expiration procedures are adopted, the password modification procedure includes captcha validation
- Automatically closing the user session if the IP address changes during the session, in order to prevent hijacking of the same.
- Automatically closing the user session if a new user session is started on a different browser in order to prevent multiple concurrent sessions
- Tracking all IP addresses used by users.
- Blocking access from certain IP addresses
- Restricting access to certain ranges of IP addresses only
The hosting infrastructure is protected by an extensive network of monitoring systems. These systems provide important security features such as basic protection against Distributed Denial of Service (DDoS) attacks and detection of brute force attacks on accounts. In addition, infrastructure components are continuously scanned and tested.
The data centers used to host the application are located in different regions of the world and in different availability zones for each region. Each availability zone is an independent error zone. For this reason, availability zones have been physically separated within a region and are located in low-risk areas. Each one is fed by different grids, so as to reduce the individual error points. The availability zones are connected redundantly to different first level transit providers.
In the unlikely event of a breakdown, customer data traffic would be removed from the affected area by automated processes.
Core applications are deployed in an N+1 configuration, so if one data center were to stop operating, there would still be enough capacity to balance the traffic load on the other centers.