Your Data, Your Ledger: Our Privacy Commitment
At Mypeopeslekocs Payroll Services, we treat your financial data with the same meticulous care we apply to every payroll run. This policy outlines exactly how we collect, protect, and use information to maintain the integrity of your people cloud system and your trust.
1 Information Collection: Precision, Not Extrapolation
We collect only the data essential for accurate payroll processing and legal compliance. This falls into two categories:
-
•
Employer & Employee Data: Name, address, Social Security Number (SSN), EIN, wage details, withholding preferences, and direct deposit information. This is provided directly by you via secure forms or encrypted file upload.
-
•
Transactional & Technical Data: Timestamps for payroll submissions, IP addresses for fraud prevention, and session data to maintain your account's security during your people cloud portal access.
We do not purchase data from third parties. We do not sell your information. Your data is used solely to execute your payroll and fulfill our service agreement.
Visual Anchor: The Immutable Record
Every entry in your people cloud record is treated with this level of deliberate care. We log access and changes to create an audit trail, ensuring accountability for every dollar processed.
Security Architecture: Encryption in Transit and at Rest
Your data's journey from entry to final report is secured by multiple layers of protection, designed to meet the rigorous standards required for financial information.
Encryption Standard
TLS 1.2+ for all data transmission. AES-256 encryption for data storage. This is the same standard used by major financial institutions.
Access Control
Role-based permissions ensure only authorized personnel access specific data. Multi-factor authentication (MFA) is mandatory for all internal and client portal logins.
Data Retention
We retain payroll records for the legally required minimum of 4 years after employment termination, ensuring compliance for tax audits and dispute resolution.
Note on Third Parties: We use trusted partners for payment processing (ACH) and document storage. These vendors are bound by equivalent privacy agreements. A full list is available upon request.
You Own Your Data: Your Control Panel
You are not merely a user; you are the data controller. Our systems are built to facilitate your rights, not obscure them.
Access & Portability
Request a complete copy of your personal data in a structured, commonly used, machine-readable format (e.g., CSV). We will provide it within 30 days of your verified request.
Correction & Rectification
Identify inaccurate personal data. We'll correct it upon verification, and notify any third parties who may have received the incorrect data (if applicable).
Erasure ("Right to be Forgotten")
Request deletion of your personal data. Note: We may retain information where required by law (e.g., final payroll tax filings).
Opt-Out & Restrictions
Restrict processing of your data under certain conditions (e.g., contesting accuracy). You may also opt-out of non-essential communications related to service updates.
Method Note: Evaluating Privacy Risk & Scope
Our approach to privacy is rooted in the principle of data minimization and purpose limitation. Before any feature is built, we ask: "What specific payroll or compliance problem does this solve, and what is the absolute minimum data required to solve it?"
This evaluation includes a robustness assessment. For instance, a request for employee birthdate is cross-checked against legitimate needs (e.g., benefit eligibility vs. age discrimination). We also consider limits: no system is 100% secure against all threat vectors. Our mitigation is a combination of technical controls (encryption), procedural controls (access logs), and contractual obligations (with data processors).
The key trade-off is always between security/accuracy and usability. A system that is too burdensome won't be used correctly. Our design aim is to make secure data handling feel like a natural part of the payroll workflow, not an obstacle.
Questions About Your Privacy?
For Data Protection Requests, to exercise your rights, or to raise a concern, contact our dedicated privacy officer directly.
By using our services, you acknowledge you have read and agree to be bound by this Privacy Policy. This policy is part of our overarching Terms of Service.
Compliance & Certifications
Our frameworks are aligned with recognized data protection standards.
SOC 2 Type II Principles
GDPR-Compliant Structure
Annual Security Audits