{"id":15575,"date":"2024-05-08T16:55:52","date_gmt":"2024-05-08T20:55:52","guid":{"rendered":"https:\/\/gtm.com\/business\/?page_id=15575"},"modified":"2024-08-29T13:13:17","modified_gmt":"2024-08-29T17:13:17","slug":"data-security","status":"publish","type":"page","link":"https:\/\/gtm.com\/business\/why-gtm\/data-security\/","title":{"rendered":"Our Commitment to Data Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.19.0&#8243; custom_padding_tablet=&#8221;50px|0|23px|0||&#8221; custom_padding_phone=&#8221;||10px||false|false&#8221; transparent_background=&#8221;off&#8221; padding_mobile=&#8221;off&#8221; make_fullwidth=&#8221;off&#8221; use_custom_width=&#8221;off&#8221; width_unit=&#8221;on&#8221; global_module=&#8221;3056&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_image src=&#8221;https:\/\/gtm.com\/business\/wp-content\/uploads\/Business-Hero-3.jpg&#8221; alt=&#8221;Business-Hero-3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_image][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; custom_padding_last_edited=&#8221;off|tablet&#8221; admin_label=&#8221;Section&#8221; _builder_version=&#8221;4.23.1&#8243; custom_padding=&#8221;10px||5px||false|false&#8221; custom_padding_tablet=&#8221;50px|0|50px|0&#8243; custom_padding_phone=&#8221;5px||5px||true|false&#8221; transparent_background=&#8221;off&#8221; padding_mobile=&#8221;off&#8221; make_fullwidth=&#8221;off&#8221; use_custom_width=&#8221;off&#8221; width_unit=&#8221;on&#8221; global_module=&#8221;3434&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_title meta=&#8221;off&#8221; featured_image=&#8221;off&#8221; _builder_version=&#8221;4.23.1&#8243; title_text_align=&#8221;left&#8221; title_text_color=&#8221;#46a510&#8243; title_font_size=&#8221;36px&#8221; background_color=&#8221;rgba(255,255,255,0)&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;off&#8221; custom_padding=&#8221;30px||||false|false&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; parallax_effect=&#8221;on&#8221; module_bg_color=&#8221;rgba(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221; title__hover_enabled=&#8221;off|desktop&#8221;][\/et_pb_fullwidth_post_title][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;5px|||&#8221; custom_padding_tablet=&#8221;50px|0|50px|0&#8243; custom_padding_phone=&#8221;&#8221; transparent_background=&#8221;off&#8221; padding_mobile=&#8221;off&#8221; make_fullwidth=&#8221;off&#8221; use_custom_width=&#8221;off&#8221; width_unit=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Intro&#8221; _builder_version=&#8221;4.25.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-15643\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/fraud-prevention-data-security-683x1024.jpg\" alt=\"\" width=\"341\" height=\"512\" \/>At GTM, we understand that trust is the foundation of our relationship with you. When it comes to payroll, security, and compliance these are not just priorities, but imperatives. We are dedicated to maintaining the highest levels of data security, fraud prevention, and regulatory compliance to protect the sensitive information you entrust to us.<\/p>\n<p>Our state-of-the-art security measures are designed to safeguard your data from unauthorized access and cyber threats. We employ a robust combination of physical, administrative, and technical controls, including advanced encryption technologies, continuous network monitoring, and strict access controls, ensuring that your data is protected around the clock.<\/p>\n<p>Security is integral to our operations. It\u2019s at the very core of what we do with multiple layers of protection embedded into our products, processes, and infrastructure.<\/p>\n<p>We stay abreast of the latest regulations and standards in the payroll industry and work tirelessly to ensure our processes and policies meet or exceed all statutory and regulatory requirements, giving you peace of mind.<\/p>\n<p>We are committed to delivering a payroll solution that is not only efficient and reliable but also rigorously secure and compliant. Trust us to handle your payroll needs, so you can focus on what matters most \u2014 running your business.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/gtm-data-security-fraud-prevention.png&#8221; alt=&#8221;GTM Data Security and Fraud Prevention&#8221; title_text=&#8221;gtm-data-security-fraud-prevention&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;Security&#8221; _builder_version=&#8221;4.25.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>How GTM Keeps Your Data Secure<\/h2>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-15620 size-full\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/annual-security-assessments32x32-1.png\" alt=\"\" width=\"32\" height=\"32\" \/>Annual Security Assessments<\/h3>\n<p>GTM undergoes annual security assessments from the New York State Department of Financial Services and adheres to the National Institute of Standards and Technology (NIST) for cybersecurity standards.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15623 alignleft size-full\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/third-party-audit.png\" alt=\"\" width=\"32\" height=\"32\" \/>Third-Party Audits<\/h3>\n<p>GTM submits to several third-party audits including SOC 1 audit, Nacha, and financial statement audits.<\/p>\n<h4>SOC 1 Audit<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7114 size-full alignright\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2019\/08\/aicpa_soc.jpg\" alt=\"soc-1 compliant\" width=\"224\" height=\"223\" srcset=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2019\/08\/aicpa_soc.jpg 224w, https:\/\/gtm.com\/business\/wp-content\/uploads\/2019\/08\/aicpa_soc-150x150.jpg 150w\" sizes=\"(max-width: 224px) 100vw, 224px\" \/>Developed by the American Institute of Certified Public Accountants (AICPA), a SOC 1 audit is specifically designed to assess the operational effectiveness of the key internal compliance and information security controls at a service organization like a payroll provider.<\/p>\n<p>For our clients, a SOC 1 audit helps:<\/p>\n<ul>\n<li>Ensure the protection of their financial information<\/li>\n<li>Demonstrate GTM\u2019s commitment to corporate governance<\/li>\n<li>Provide assurance that our systems are secure<\/li>\n<\/ul>\n<p>Conducted by an independent and certified public accounting firm, a SOC 1 audit is considered the industry standard for evaluating, testing, and reporting on security and compliance controls and shows an organization\u2019s commitment to client data security.<\/p>\n<h4>Nacha Certification<\/h4>\n<p>As part of our continued efforts to assure our commitment to data integrity and security in our handling of client data, GTM undergoes an audit of our compliance with established rules and procedures provided by the National Automated Clearinghouse Association (Nacha).<\/p>\n<p>Nacha governs the ACH Network, the payment system that drives trillions of dollars each year in direct deposits and direct payments.<\/p>\n<p>Becoming Nacha Certified means GTM has taken the necessary steps to understand threats and put proper controls in place to manage risk, providing a level of security for our clients and the workers they employ who depend on GTM to get paid. It shows that GTM is upholding the highest standards to protect your employees\u2019 pay and keep their information secure.<\/p>\n<p>To become Nacha Certified, GTM conducted both a Nacha Rules Compliance Audit and an ACH Risk Assessment and implemented a Compliance and Risk Program with detailed policies and procedures.<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-15646\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/third-party-aduits-683x1024.jpg\" alt=\"\" width=\"347\" height=\"521\" \/>Financial Statement Audit<\/h4>\n<p>A financial statement audit is an examination of the accuracy and completeness of a company&#8217;s financial statements conducted by an independent auditor.<\/p>\n<p>GTM prepares its financial statements in accordance with a framework of generally accepted accounting principles (GAAP) in the U.S.<\/p>\n<p>The fair presentation of those financial statements is evaluated by independent auditors using a framework of generally accepted auditing standards (GAAS) which set out requirements and guidance on how to conduct an audit.<\/p>\n<p>Our clients and partners can take comfort from the independent assurance that GTM\u2019s financial statements fairly present the company\u2019s financial position and performance.<\/p>\n<p>Additionally, this means:<\/p>\n<ul>\n<li>Increased confidence in GTM\u2019s reliability and stability<\/li>\n<li>A lower risk of service disruption due to financial instability<\/li>\n<li>Reduced likelihood of regulatory or legal issues that could indirectly affect them<\/li>\n<li>Transparency in our operations, which provides a clear view of our financial health and business practices<\/li>\n<\/ul>\n<p>By undergoing a financial statement audit, GTM provides assurance of our financial health and adherence to accounting standards, which enhances trust and reduces risk for our clients.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15626 alignleft size-full\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/employee-training.png\" alt=\"\" width=\"32\" height=\"32\" \/>Employee Training<\/h3>\n<p>GTM employees complete monthly security awareness training and phishing testing. Topics include:<\/p>\n<ul>\n<li>Clean Desk<\/li>\n<li>Bring-Your-Own Device<\/li>\n<li>Data Management<\/li>\n<li>Removable Media<\/li>\n<li>Safe Internet Habits<\/li>\n<li>Physical Security<\/li>\n<li>Social Media<\/li>\n<li>Scams (phishing, vishing, smishing, spear phishing, and whaling)<\/li>\n<li>Malware<\/li>\n<li>Social Engineering<\/li>\n<li>Incident Response<\/li>\n<li>Security Responsibilities<\/li>\n<\/ul>\n<p>Key personnel receive continual training in new guidelines and practices, testing, and advanced technology.<\/p>\n<p>GTM requires more than one form of verification to access sensitive payroll information (Multi-Factor Authentication or MFA).<\/p>\n<p>GTM also uses Role-Based Access Control (RBAC) to limit access to payroll data based on the user&#8217;s role within the company, ensuring that employees can only access information necessary for their job functions.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15627 alignleft size-full\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/technology-testing.png\" alt=\"\" width=\"32\" height=\"32\" \/>Technology Testing and Evaluation<\/h3>\n<p>In addition to malware detection and prevention, firewalls, and other industry-standard tools, GTM\u2019s testing and evaluation of our technology assures our clients and partners that we are serious about maintaining high-security standards and protecting sensitive data from potential cyber threats.<\/p>\n<h4>Penetration Testing<\/h4>\n<p>GTM undergoes third-party penetration testing, which brings an unbiased perspective to the security assessment process. Penetration testing identifies and exploits vulnerabilities in our applications and network infrastructure by simulating cyberattacks under controlled conditions and tests the effectiveness of our existing security measures to isolate any weaknesses that a real attacker could exploit.<\/p>\n<p>GTM receives a detailed report outlining discovered vulnerabilities, the methods used to exploit them, and the potential impact of each exploit. This report also includes recommendations for remediation to further enhance our security posture.<\/p>\n<h4>Monthly Vulnerability Scanning<\/h4>\n<p>Monthly vulnerability scanning is a proactive security measure where we scan our technology systems, such as networks, applications, and other computing resources, to identify and report potential vulnerabilities. This process is an essential part of our robust cybersecurity strategy, ensuring that vulnerabilities are identified and addressed systematically before they can be exploited by malicious actors.<\/p>\n<h4>24x7x365 Intrusion and Threat Detection<\/h4>\n<p>GTM deploys continuous, around-the-clock monitoring of our computer networks and systems to identify and respond to potential security threats, breaches, or unauthorized activities every hour of the day, every day of the year. This level of constant vigilance is crucial for GTM in protecting sensitive data and critical infrastructure from increasingly sophisticated cyber threats.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Fraud Prevention&#8221; _builder_version=&#8221;4.25.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; z_index_tablet=&#8221;500&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>How GTM Helps Prevent Fraud<\/h2>\n<p>Combatting fraud is vital for any payroll company, as it directly influences the security of sensitive financial data and the overall trust that clients place in the company&#8217;s services.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15629 size-full alignleft\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/fraud-detection.png\" alt=\"\" width=\"32\" height=\"32\" \/>Dedicated Fraud Prevention Program<\/h3>\n<p>GTM\u2019s dedicated fraud prevention program is essential for protecting against fraud, ensuring the integrity of financial transactions, and maintaining the trust of our clients and their employees. Our program encompasses a range of measures and tools designed to detect, prevent, and respond to fraudulent activities. Our program includes:<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-15649\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/technology-testing-684x1024.jpg\" alt=\"\" width=\"348\" height=\"521\" \/>Employee Training and Awareness<\/h4>\n<p>GTM employees receive ongoing training on recognizing and preventing fraud. This includes understanding the types of fraud that can occur in payroll processes, such as ghost employees, wage overrides, check washing, false wage claims, and timesheet fraud as well as initiatives to keep our staff alert to the signs of fraud, encouraging vigilance in their daily tasks.<\/p>\n<h4>Audit Trails and Monitoring<\/h4>\n<p>GTM has tools to monitor payroll transactions for signs of unusual activity that could indicate fraud and keep comprehensive logs of all payroll transactions, which can be used to trace the origins of fraudulent activity.<\/p>\n<h4>Fraud Detection Technology<\/h4>\n<p>Utilizing advanced analytics, GTM can spot patterns and anomalies that may suggest fraudulent activities, such as duplicate payments or irregular payroll adjustments.<\/p>\n<h4>Incident Response Plan<\/h4>\n<p>GTM has a formal plan that outlines the steps to be taken in response to a detected payroll fraud incident, including how to contain the fraud, mitigate damage, investigate the incident, and notify affected parties.<\/p>\n<h4>Partnerships and Collaborations<\/h4>\n<p>Working with financial institutions, cybersecurity firms, and other partners, GTM continues to enhance fraud detection capabilities, keep pace with ever-evolving anti-fraud practices, and secure transaction processes.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15632 alignleft size-full\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/group.png\" alt=\"\" width=\"32\" height=\"32\" \/>Payroll Fraud Prevention Group<\/h3>\n<p>GTM is an active member of the Payroll Fraud Prevention Group, an association of payroll industry organizations, dedicated to sharing fraud information, working with outside vendors to build cost-effective solutions to share fraud information, educating the payroll industry on the issues posed by payroll fraud, and lobbying for regulatory changes as needed.<\/p>\n<p>The group was organized to promote the prevention of fraud in the payroll industry and proactively address any major policy, administrative, and systematic issues that impact payroll service providers.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15631 alignleft size-full\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/2024\/05\/fraud-prevention-policies.png\" alt=\"\" width=\"32\" height=\"32\" \/>Fraud Prevention Policies<\/h3>\n<h4>Know Your Client<\/h4>\n<p>Know Your Client (KYC) verification is a standard used in the financial services industry to verify customers, act as the first line of defense against fraud and other illegal activities, and safeguard both GTM and our clients.<\/p>\n<p>The three components of KYC include the customer identification program (CIP), customer due diligence (CDD), and enhanced due diligence (EDD). These measures are designed to prevent identity theft, financial fraud, and money laundering.<\/p>\n<h4>Bank Secrecy Act<\/h4>\n<p>GTM complies with its Bank Secrecy Act (BSA) and its anti-money laundering (AML) policy by:<\/p>\n<ul>\n<li>Reporting actions that might signal criminal activity like money laundering or tax evasion<\/li>\n<li>Establishing effective customer due diligence systems and suspicious activity monitoring programs<\/li>\n<li>Adopting a customer identification program<\/li>\n<li>Designating a compliance officer who oversees BSA compliance<\/li>\n<li>Implementing rigorous internal controls<\/li>\n<li>Conducting regular employee training and periodic independent audits<\/li>\n<\/ul>\n<p>Compliance with the BSA is a critical component of GTM\u2019s risk management framework by preventing criminal elements from utilizing GTM payroll transactions for illicit purposes.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At GTM, we understand that trust is the foundation of our relationship with you. When it comes to payroll, security, and compliance these are not just priorities, but imperatives. We are dedicated to maintaining the highest levels of data security, fraud prevention, and regulatory compliance to protect the sensitive information you entrust to us. Our [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":2855,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p><img class=\"alignleft size-thumbnail wp-image-1008\" style=\"margin: 8px 10px;\" src=\"http:\/\/172.81.119.2\/~gtmcom5\/business\/wp-content\/uploads\/ssae16-150x150.jpg\" alt=\"SSAE-16 Compliant\" width=\"150\" height=\"150\" \/>GTM is the only SSAE-16 compliant, independent payroll service bureau in New York\u2019s Tech Valley because we firmly believe in protecting our clients and partners and their confidential information.\u00a0 The SSAE-16 \u00a0compliance\u00a0is an internationally recognized standard developed by the American Institute of Certified Public Accountants (AICPA)\u00a0that is recognized as a mark of service quality.<\/p><p>Driven by a commitment to expertise and industry leadership, GTM voluntarily undergoes a rigorous examination and assessment process for SSAE-16 compliance.\u00a0 This enables GTM to provide assurance to existing and potential customers that the effectiveness of controls at GTM are relevant to the security, availability, and processing integrity of the system used to process customers'\u00a0information, and the confidentiality and privacy of that information.<\/p>","_et_gb_content_width":"","footnotes":""},"folder":[],"class_list":["post-15575","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/pages\/15575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/comments?post=15575"}],"version-history":[{"count":5,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/pages\/15575\/revisions"}],"predecessor-version":[{"id":15948,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/pages\/15575\/revisions\/15948"}],"up":[{"embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/pages\/2855"}],"wp:attachment":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/media?parent=15575"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/folder?post=15575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}