Streamline your salary process
The integration between TimeLog and Lessor Payroll is your way to a more efficient salary process.
A big advantage for you is that the employees always register in TimeLog, and all absence registrations and personal expenses are up to data and easily transferred to Lessor Payroll.
It makes it easy to run your salaries and at the same time you avoid errors from manual entries.
Three benefits of integrating TimeLog and Lessor Payroll
- You only need to register project time, absence and expenses in one place
- You can easily transfer your salary data from TimeLog to Lessor Payroll
- You avoid manual entries
Fast and easy setup
It is easy to set up and activate the Lessor Payroll integration. Everything you need to do is to enter the system administration in TimeLog and enable it under Integrations.
When importing in Lessor Payroll, TimeLog’s salary data is transferred to the activated salary types (project time, flex, sickness and vacation), incl. the employees’ self-paid expenses and mileage registrations.
The integration requires:
- Subscription for Lessor
- TimeLog Invoicing or Projects
Would you like to know more about how your company can
use Lessor Payroll with TimeLog?
Contact us at +45 70 200 645.
How do you document that you process sensitive personal data correctly?
Employee data, customer data, etc. are typically processed both by you and your suppliers. But your company is responsible for the correct processing of data. Therefore, you need to ask your supplier for documentation to prove they’re GDPR compliant.
Which control targets do you have in place?
Make sure to ask which control targets your supplier has in place related to data security and IT infrastructure. A control target could e.g. be a process for managing GDPR incidents, or adequate knowledge about which systems manage which data, especially personal data. A significant part of ISAE 3402 is to set up a number of documented control targets that are controlled by a specialized auditor.
When did you last assess your IT compliance?
Ask your supplier how often they revise, validate and update their IT policy and security. Companies often purchase new programs, IT tools or apps, and that must be reflected in the processes and documentation. Det er ikke nok, at en leverandør har lavet en IT-politik tilbage i 2018, da GDPR blev indført. It must be updated all the time. Unlike the ISO 2700X certifications, the control of ISAE 3402 and ISAE 3000 is performed every year. An ISO 2700X certification doesn’t need renewal, but shows that the conditions were met at the time of the certification. So, if your supplier has an ISO certification, ask when it was done.
Do you revise both processes and procedures and physical and logistical security?
How often do you visit your supplier? Maybe they’re placed completely or partially in a different country? An ISAE 3402 declaration includes a physical audit of the security.
What is your procedure for processing sensitive personal data?
Before you implement a new system in your company, you need to know the entire process for how your supplier processes your, your customers’ or your employees’ data. In Europe, all companies are governed by the same rules related to GDPR. You need to be aware of the documentation of how the company lives up to these rules.
What is your procedure in case of a security breach?
Ask how the supplier manages a security breach. And note if they have a standardised and documented process. Are your data accessed by someone without permission, your supplier is obligated to inform you. With an ISAE 3000 declaration, you’re guaranteed this will happen. The reason is that companies who obtain an ISAE declaration set up procedures that are revised regularly.
Which data do you process?
You probably have an idea about which data your supplier should process. But make sure your supplier can document the data they process. Also if your supplier used sub-suppliers or partners. With an ISAE 3000 declaration, you can see an exact overview of which data are processed. And then you don’t need to investigate it yourself.
Which risks have you covered in connection to the processing of my data?
It’s always good to be prepared. So before you enter into a cooperation with a new supplier, you need to ask for a thorough description of the risk they have listed related to their data processing. With ISAE 3402 you are sure that processes and procedures related to data are controlled and approved by an independent specialist.
How do you ensure the collaboration between your IT security and GDPR obligations?
Many companies are relatively good at describing how they comply with the GDPR rules. But it’s as important that the IT security, e.g. systems, infrastructure and processes, work with your GDPR measures, and that the IT security is as well-documented as the GDPR policy. Without IT security, GDPR measures have no value. If you want to be on the safe side, look for a supplier with both an ISAE 3000 and an ISAE 3402 declaration.
How do you document that the IT security in your company mature and improve constantly?
You’d like to know that you have a supplier, where security is not just a buzzword, but an integrated part of the organisation. A demand as part of ISAE 3402 is internal education related to IT security, data processing, etc. Ask your supplier what they do to make sure that employees also think about IT security and GDPR as part of their daily work routines.
Our GDPR compliance has been reviewed and approved by independent auditors
Our GDPR compliance and IT infrastructure have been quality assured by independent auditors' statements through the ISAE 3000 GDPR and ISAE 3402 reports. See our reports and learn more about ISAE 3000 and ISAE 3402.