Âé¶¹´«Ã½


      








 














    

WORKDAY COMPLIANCE

Our compliance program.

Our strict compliance program consists of third-party audits and international certifications specifically designed to provide data security and privacy, protect against security threats or data breaches, and prevent unauthorized access to your data.

''

Our compliance resources.

AICPA SOC

SOC 1

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ VNDLY

Service Organization Controls (SOC 1) reports provide information about a service organization¡¯s control environment that may be relevant to the customer¡¯s internal controls over financial reporting.

Our SOC 1 Type II report is issued in accordance with the International Standard on Assurance Engagements (ISAE) 3402 (Assurance Reports on Controls at a Service Organization). The SOC 1 report covers the design and operating effectiveness of controls relevant to Âé¶¹´«Ã½ enterprise cloud applications.

AICPA SOC

SOC 2

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing, Âé¶¹´«Ã½ Peakon Employee Voice, Âé¶¹´«Ã½ VNDLY, HiredScore AI for Recruiting, HiredScore AI for Talent Mobility, Âé¶¹´«Ã½ Contract Lifecycle Management, powered by Evisort AI.

The SOC 2 Type II report is an independent assessment of our control environment performed by a third party.

The SOC 2 report is based on the AICPA (American Institute of Certified Public Accountants) Trust Services Criteria and is issued annually in accordance with the AICPA¡¯s AT Section 101 (Attest Engagements). The SOC 2 report details the design and operating effectiveness of controls relevant to any system containing customer data as part of Âé¶¹´«Ã½ applications. The Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½ SOC 2 report addresses all of the Trust Services Criteria (Security, Availability, Confidentiality, Processing Integrity, and Privacy). Additionally, the report addresses the NIST Cybersecurity Framework and NIST 800-171 as part of the SOC 2+ Additional Subject Matter process, which includes an audited mapping of Âé¶¹´«Ã½ controls against these frameworks.

AICPA SOC

SOC 3

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Peakon Employee Voice, Âé¶¹´«Ã½ Strategic Sourcing

The AICPA has developed the SOC 3 framework for safeguarding the confidentiality and privacy of information that is stored and processed in the cloud.

The SOC 3 report, an independent assessment of our control environment performed by a third party, is publicly available and provides a summary of our control environment relevant to the security, availability, confidentiality, processing integrity, and privacy of customer data.

Access our SOC 3 report for Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½.

Access our SOC 3 report for Âé¶¹´«Ã½ Adaptive Planning.

Access our SOC 3 report for Âé¶¹´«Ã½ Peakon Employee Voice.?

Access our SOC 3 report for Âé¶¹´«Ã½ Strategic Sourcing.

Globe icon

ISO 27001

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing, Âé¶¹´«Ã½ VNDLY,?and Âé¶¹´«Ã½ Peakon Employee Voice

Our Information Security Management System (ISMS) meets the requirements set forth by this globally recognized, standards-based approach to security.

Access our consolidated ISO 27001 certificate for Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing, and Âé¶¹´«Ã½ Peakon Employee Voice.

Access our ISO 27001 certificate for VNDLY.

Globe icon

ISO 27017

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning

This standard provides controls and implementation guidance for information security controls applicable to the provision and use of cloud services.

Access our consolidated ISO 27017 certificate for Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½ and Âé¶¹´«Ã½ Adaptive Planning.

Globe icon

ISO 27018

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning

This standard contains guidelines applicable to cloud service providers that process personal data.

Access our consolidated ISO 27018 certificate for Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½ and Âé¶¹´«Ã½ Adaptive Planning.

Globe icon

ISO 27701

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning

This standard provides the requirements and guidelines for the implementation and continuous improvement of an organization¡¯s Privacy Information Management System (PIMS) as an extension to ISO/IEC 27001.

Access our consolidated ISO 27701 certificate for Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½ and Âé¶¹´«Ã½ Adaptive Planning.

Globe icon

ISO 42001

Applies to: Âé¶¹´«Ã½ Human Capital Management, Âé¶¹´«Ã½ Financial Management, Âé¶¹´«Ã½ Student, Âé¶¹´«Ã½ Spend Management, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Peakon Employee Voice, Âé¶¹´«Ã½ Payroll, Âé¶¹´«Ã½ Workforce Management, Âé¶¹´«Ã½ Talent Management, Âé¶¹´«Ã½ Analytics and Reporting, Âé¶¹´«Ã½ Platform and Product Extensions.

ISO 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an artificial intelligence management system (AIMS) within organizations. It is designed for entities providing or utilizing AI-based products or services, ensuring responsible development and use of AI systems.

Access our consolidated ISO 42001 report.

Globe icon

NIST AI Risk Management Framework (NIST AI RMF)

Applies to: Âé¶¹´«Ã½, Inc.

The NIST AI Risk Management Framework (AI RMF) was developed to help individuals, organizations, and society manage the potential risks of AI and promote trustworthy development and responsible use of AI systems. It is intended for voluntary use and to improve the ability to incorporate trustworthiness considerations into the design, development, use, and evaluation of AI products, services, and systems.

Access our NIST AI Risk Management Framework attestation.

truste certified privacy

TRUSTe Enterprise Privacy and Data Governance Certification

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing

Âé¶¹´«Ã½ is a participant under the TRUSTe Enterprise Privacy & Data Governance Practices Program.

This program is designed to enable organizations such as Âé¶¹´«Ã½ to demonstrate that their privacy and data governance practices for personal information comply with standards based on recognized laws and regulatory standards, including the OECD Privacy Guidelines, the APEC Privacy Framework, the EU General Data Protection Regulation (GDPR), the U.S. Health Insurance Portability and Accountability Act (HIPAA), ISO 27001 International Standard for Information Security Management Systems, and other privacy laws and regulations globally.?

Access our TRUSTe .

Globe icon

SIG Questionnaire

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing, Âé¶¹´«Ã½ Peakon Employee Voice, Âé¶¹´«Ã½ VNDLY

The Standardized Information Gathering (SIG) questionnaire is an industry-standard compilation of questions used to assess information technology and data security across a broad spectrum of risk control areas.

The SIG is issued by Shared Assessments, a global organization dedicated to third-party risk assurance. Âé¶¹´«Ã½ self-assesses against the SIG annually, providing our customers with an in-depth view of our control environment against a standardized set of inquiries. Customers can access the on Âé¶¹´«Ã½ Community.

nist

NIST CSF and NIST 800-171

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½

The NIST Cybersecurity Framework (CSF) provides guidance for organizations on how to improve their ability to prevent, detect, and respond to cybersecurity risks. The NIST Privacy Framework provides guidance on measuring and improving an organization¡¯s Privacy program. The NIST 800-171 standard relates to protecting Controlled Unclassified Information in non-federal Information Systems and Organizations.

Âé¶¹´«Ã½ has mapped our relevant SOC 2 controls to the NIST CSF, NIST PF, and NIST 800-171 standards. This mapping has been audited as part of the Âé¶¹´«Ã½ SOC 2+ report.

truste certified privacy

TrustArc and Data Privacy Framework

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing

Âé¶¹´«Ã½ is an active participant in the Data Privacy Framework Program. TRUSTe is the Âé¶¹´«Ã½ third-party verification agent for the Data Privacy Framework.

Access our Data Privacy Framework .

EU Cloud COC

EU Cloud Code of Conduct

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning

The EU Cloud Code of Conduct (CCoC) consists of a set of requirements that enable cloud service providers (CSPs) to demonstrate their capability to comply with GDPR.

Adherence ID: 2019LVL02SCOPE001

Access the Âé¶¹´«Ã½ .

HIPAA

HIPAA

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½

Âé¶¹´«Ã½ has completed a Health Insurance Portability and Accountability Act (HIPAA) third-party attestation for the Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, which provides assurance that Âé¶¹´«Ã½ has a HIPAA-compliance program with adequate measures for saving, accessing, and sharing individual medical and personal information.

fedramp

FedRAMP Moderate

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½

The Federal Risk and Authorization Management Program, or FedRAMP, is a U.S.-government program that enables federal agencies to adopt cloud-based systems into their IT environments. FedRAMP provides a standardized approach to security and risk assessment for cloud technologies and federal agencies to make sure that federal data is continuously protected at the highest level in the cloud.

Âé¶¹´«Ã½ is FedRAMP Authorized status at the Moderate security impact level for Âé¶¹´«Ã½ Government Cloud.

globe lock icon

G-Cloud

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Peakon Employee Voice

The G-Cloud framework is an agreement between the UK government and cloud-based service providers.

G-Cloud enables cloud-based service providers to apply to and, once accepted, sell their cloud services to UK public sector organizations. The G-Cloud framework is updated annually by the governing body Crown Commercial Services (CCS).

UK public sector organizations can currently purchase Âé¶¹´«Ã½ service offerings via the CCS Digital Marketplace.

cyber essentials plus

Cyber Essentials Plus

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing, Âé¶¹´«Ã½ Peakon Employee Voice, Âé¶¹´«Ã½ VNDLY

Cyber Essentials Plus is a UK-government-backed scheme to help organizations protect against cybersecurity threats by setting out baseline technical controls.

Access our Cyber Essentials Plus .

irap

Australian IRAP

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning

The Australian Government maintains security documentation relating to the use of ICT services, including cloud services. This is represented through the Information Security Manual (ISM) and the Protective Security Policy Framework (PSPF). The Infosec Registered Assessors Program (IRAP), maintained by the Australian Cyber Security Centre (ACSC), endorses individual assessors to review an organization¡¯s effectiveness against controls in the ISM and PSPF.

Âé¶¹´«Ã½ engages a third-party assessor to perform an IRAP assessment of the suitability of the controls in the ISM and PSPF against Âé¶¹´«Ã½ Production environments at the PROTECTED level.

CSA Trusted Cloud Provider

CSA Trusted Cloud Provider

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing, Âé¶¹´«Ã½ Peakon Employee Voice, Âé¶¹´«Ã½ VNDLY

Built upon existing Cloud Security Alliance programs, the Trusted?Cloud Provider program allows organizations to demonstrate their?commitment to holistic security and serves as a reference point for?customers looking to identify cloud providers that are aligned with?their security requirements.

globe lock icon

CSA STAR Self-Assessment

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing, Âé¶¹´«Ã½ Peakon Employee Voice, Âé¶¹´«Ã½ VNDLY

The Cloud Security Alliance (CSA) Security, Trust & Assurance Registry (STAR) Consensus Assessments Initiative Questionnaire (CAIQ) consolidates current information regarding security risks and controls into one industry-standard questionnaire. Many Âé¶¹´«Ã½ customers use CSA¡¯s questionnaires for their own internal vendor assessment procedures.

Âé¶¹´«Ã½ is STAR Level 1 Certified on the CSA STAR Registry. Access the Âé¶¹´«Ã½ listing on the STAR Registry.

tisax

TISAX

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing

The Trusted Information Security Assessment Exchange (TISAX) is administered by the on behalf of the German Association of the Automotive Industry. This standard provides the European automotive industry with a consistent, standardized approach to information security systems.

Result available on the .

globe lock icon

CCCS CSP ITS Assessment

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½

The Canadian Centre for Cyber Security (CCCS) established the Cloud Service Provider (CSP) Information Technology Security (ITS) Assessment Program to assist Government of Canada (GC) departments and agencies in their evaluation of CSP services. CCCS provides advice and guidance on the technical, operational, and procedural ITS capabilities of CSPs. The assessment determines if security processes and controls meet the GC public cloud security requirements for information and services up to Protected B, Medium Integrity, and Medium Availability (PB/M/M) as published by the Treasury Board of Canada Secretariat.

globe lock icon

TX-RAMP

Applies to: Âé¶¹´«Ã½ Enterprise Âé¶¹´«Ã½, Âé¶¹´«Ã½ Adaptive Planning, Âé¶¹´«Ã½ Strategic Sourcing, Âé¶¹´«Ã½ Peakon Employee Voice, Âé¶¹´«Ã½ VNDLY

The Texas Risk and Authorization Management Program (TX-RAMP) is a DIR program that provides review of security measures taken by cloud products and services that transmit data to Texas state agencies. Cloud providers must comply with an established DIR framework and continuous compliance to be accepted. TX-RAMP was established from requirements put forth in Senate Bill 475.

Âé¶¹´«Ã½ is certified at TX-RAMP Level 2.

Get the power to adapt.

Ready to talk?
Get in touch.