Accutrace integrates with several applicant tracking systems and HRIS/HCM/ERP systems, which allow you to collect applicant data, submit background screening requests and receive background screening results on your third-party HRMS or ATS platform to simplify your on-boarding process.
Peoplefluent (formerly Peopleclick)
Taleo Business Edition
CATS (Open Source)
If you don't see your system on the list, give us a call and we can discuss building an integration system for you. Accutrace can also integrate with your proprietary system.
Electronic I-9/E-Verify Management System
Enter, store, report and audit data for complete I-9/E-Verify compliance with our easy-to-use electronic I-9/E-Verify management system.
Electronic signatures consent & release forms
Electronic consent forms can be created by the client using their organization, specific language or we can provide sample language as a guideline.
Customized web portals for self-register applicant program
Expand your screening options with Accutrace DirectCheck™, a quick, simple online process for applicants to self-register and pay for their own background check. DirectCheck™ also allows for applicant entry, relieving you of the data entry process.
The Accutrace system is the most interactive, user-friendly and secure web-based ordering system on the market today. Each authorized person using this system can be assured of safe and secured transfer of information. Since an authorized person can access the site via an Internet browser, with a user ID and strong password, access can be attained from anywhere. All information passed through the system complies with FCRA requirements.
1. Secure website
Accutrace utilizes a reputable Internet Service Provider (ISP) and host to our screening platform. When authorized users connect to the system, the Internet connection is secured using 128 bit secured socket layers, which is verified by a GeoTrust digital certificate. GeoTrust's Identity Verification Services ensures the identity of business entities and/or individuals in online transactions.
The servers are physically located at an ISP facility that provides 24-hour a day monitoring. This facility utilizes a card access and CCTV monitoring system to control access to their facility. Personnel requiring access to the data center must be on a pre-authorization list and surrender a valid driver’s license prior to being able to proceed into the raised floor area. The servers are located in locked cabinets that can only be accessed by authorized technology support personnel. Once inside the cabinets, authorized technical personnel, using IDs that have strong type passwords, can only access the server consol. ISP personnel do not have access to data. Each level of the entire platform is redundant. The front-end web/application servers are maintained in a load-balanced web farm to ensure availability. The backend database is replicated live to a backup server that fills the role of a failover server in the case of a problem with the primary database server.
In order to ensure the integrity of the information we are providing and maintaining and the security of the data, Accutrace configures the solution to ensure that the specific services contractually required by the client are the only services available to them. Clients do not have the security clearance to see information produced by other clients in the system. In addition, we ensure that only authorized users of the client have access to the solution via assigned login credentials. During the implementation process, each client determines which individuals will be assigned administrator login credentials and only those individuals are allowed to make changes to their account.
Secure Connection: When an authorized user connects to our system through the Internet, the connection is secured using 128 bit secured socket layers, which is verified by a GeoTrust digital certificate. GeoTrust’s Identity Verification Services ensures the identity of business entities and/or individuals in online transactions.
Server and Database Configuration: Our data resides on servers protected by firewalls that only allow incoming https traffic. All suspicious activity is prevented and logged by the firewalls. In the event of predefined unauthorized attempts on the system, the system alerts the technology administrator via cell phone, email and pager. The database server, which houses all completed records, is on a separate sub-network not connected to the Internet and uses addresses that are not Internet-routable. This data network connects to the application servers through a dedicated firewall that allows only data requests that originate from a private IP address on the application server. This protects the database server and the data, as it is not even visible or accessible from the Internet. Only the application server, when accessed by an authorized user using compiled components of that server, can make a connection to the data for a specific record request.
Data Availability: Data is accessible on the system for 60 days and is only available to authorized individual users from the requesting client. After 60 days the data is archived and stored on separate media and is not accessible by a client user through the Internet. This archived data can only be retrieved by a special request as a historical view of the original request, and must be approved on a case-by-case basis by an administrator. No data is stored for any length of time on the application server.
Physical Security of the Servers: The servers are located at an Internet Service Provider (ISP) facility that provides 24-hour a day monitoring. This facility utilizes a card access and CCTV monitoring system to control access to its facility. Personnel requiring access to the data center must be on a pre-authorization list and surrender a valid driver’s license prior to being able to proceed into the raised floor area. The servers are located in locked cabinets that can only be accessed by authorized technology support personnel. Once inside the cabinets, authorized technical personnel, using IDs that have strong type passwords, can only access the server consol. ISP personnel do not have access to data.
System Code and Data: When code and data backups are required, the medium is stored with Iron Mountain, a leader in records and data protection. The medium is stored in a secured lockbox that cannot be accessed without specific authorization.
Independent Security Certification and Audits: Our technology is certified by Secure Works, of Atlanta, Georgia, an approved third-party certification agency of the major credit bureaus. Our processes and infrastructure are subject to audit and review at a minimum of every six months and without notice. Independent findings are reported to the credit bureaus to ensure security compliance.