Ceridian Acceptable Use Policy
Transcription
Ceridian Acceptable Use Policy
Ceridian Acceptable Use Policy Stored Value Solutions Table of Contents What is an Acceptable Use Policy? . . . . . . . . . . . . . . . . . . . . . . page1 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page1 Compliance and Acknowledgment . . . . . . . . . . . . . . . . . . . . . page1 Ceridian’s Right to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . page2 Acceptable Use Requirements . . . . . . . . . . . . . . . . . . . . . . . . . page3 Safe Work Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page3 Acceptable Use of Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . page4 Passwords and User IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page6 Email Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page7 Personal Use of Ceridian Assets . . . . . . . . . . . . . . . . . . . . . . page8 Clean Desk Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page9 Portable Asset Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . page10 Facility Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page11 Protection of Confidential Information . . . . . . . . . . . . . . . page11 Privacy Legislation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page11 Other Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page12 Conference Calls and Web Meetings . . . . . . . . . . . . . . . page12 Backup of Data Stored Locally . . . . . . . . . . . . . . . . . . . . page12 Classification of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page12 Remote Desktop Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . page13 Data and Records Retention . . . . . . . . . . . . . . . . . . . . . . page14 Need to Know Basis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page14 Telephones / Cellular Phones / FAX . . . . . . . . . . . . . . . . page14 Reporting Security and Privacy Incidents . . . . . . . . . . . . . . . page15 Questions and Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page16 Christopher H., Ceridian U.S. What is an Acceptable Use Policy? The Ceridian Acceptable Use Policy highlights the key themes found in our Information Security program and core policies and describes the minimum security and acceptable use requirements for users of Ceridian assets, either owned or managed. Ceridian’s Information Security policies vary in topic such as, Information Asset Management, Physical and Environmental Security, Access Control and Business Continuity Management. This Acceptable Use policy summarizes the critical security components of these policies by focusing on those policy requirements that apply to most of the common activities that occur in and out of the workplace. The Acceptable Use Policy is not intended to be the sole source for review of policy requirements. Instead, its purpose is to make it easier for users of Ceridian’s information assets to understand their responsibilities. It is important that you familiarize yourself with all of Ceridian’s Information Security policies. In the event that this document conflicts with published Security Policies, the original policy requirement will apply. The requirements within the Information Security program are designed to protect Ceridian and all its stakeholders from any harm or damage caused willingly or inadvertently by individuals internal and external to our company. Our stakeholders include each and every person involved with Ceridian in some capacity; they include our employees, customers, vendors and other third parties. Policies are not meant to inhibit productivity, but rather to ensure a repeatable and reliable method that protects all aspects of our company. Scope This Acceptable Use Policy must be followed by all Ceridian employees, temporaries, contractors, vendors and any others authorized by Ceridian to use Ceridian assets. The terms “user” and “end user” are used for the rest of the document to include all of these people. The term “asset” refers to any Ceridian owned or controlled computing device or collection of devices, known as a system, and any information that these systems or devices support. Ceridian computing devices, systems or assets are used interchangeably to mean the same thing in this document. Compliance and Acknowledgement Each user is responsible for ensuring they have read this document and understand their responsibilities for access to Ceridian assets and the Ceridian computing environment as well as the consequences of non-compliance. Signed acknowledgement is required upon hiring, and annual acknowledgement of familiarity with this policy is required. An employee or contractor’s manager is responsible for ensuring employees are aware of security requirements, and for cooperating with company investigations and any directions from the company regarding correction of non-compliance. Non-compliance is treated seriously and may result in suspension of service to users when deemed necessary. Depending on the severity of the circumstances, disciplinary action, up to and including termination of employment or cancellation of vendor contracts may result. Criminal or civil action against users may be reviewed or referred to appropriate authorities. 1 Ceridian’s Right to Monitor All electronic and communication systems, and all information sent, received, created on or contained upon Ceridian assets, is the property of Ceridian and should not be considered in any way as belonging to the user. Users should not have any expectations of privacy as Ceridian maintains the administrative authority to permit access to all material transmitted or stored on its computer systems or using its computing assets, including information that has been protected by a password. All contents of Ceridian’s IT resources and communications systems are the property of the company. Therefore, there should be no expectation of privacy when you use any of Ceridian provided equipment or tools, including in any message, file, data, document, facsimile, telephone conversation, social media post or conversation , or any other kind of information or communications transmitted to, received or printed from, or stored or recorded on the company’s electronic information and communications systems. All Ceridian users are bound by confidentiality and/or non-disclosure agreements. This restriction applies at all times, in any and all medium whether during work time or not, and whether devices and assets are Ceridian supplied or not. Unless expressly authorized to do so, users are not allowed to communicate or disclose any information about Ceridian or Ceridian customers and prospects. Users are not even allowed to acknowledge who our customers are without express permission to do so. If Ceridian becomes aware of any such unauthorized disclosure, the user may be subject to compliance action wherever or whenever the infraction occurred. All monitoring will be done with adherence to applicable legislative requirements. The purpose of monitoring (internal or external) is to confirm compliance with policies, support investigations, comply with any legal requirement (such as Court Orders, Subpoenas or Search Warrants) and assist with the management of Ceridian assets. Employee consent is deemed to be given on: • Acknowledgement of receipt of these guidelines, or • Acknowledgement of annual review of these guidelines, or • Continued use of Ceridian information assets and systems, or • Other methods as may be implemented by company management. 2 Acceptable Use Requirements Ceridian information assets, such as but not limited to desktops, laptops and Blackberrys, issued to employees are the property of Ceridian and may be used only for its legitimate business purposes. Users are permitted access to these assets to assist them in the performance of their jobs. All users have the responsibility to use Ceridian assets in a professional, ethical and lawful manner. Use of Ceridian assets is considered a privilege that may be revoked at any time. Safe Work Environment Ceridian strives to maintain a safe and productive environment which is free from discrimination and harassment. This also applies to the Ceridian computing environment and all assets contained within. Users are expected to refrain from downloading, storing, sending and receiving material that may be considered inappropriate or offensive under Ceridian discrimination and harassment policies and/or its Code of Conduct. This includes, but is not limited to: • Material that advocates or promotes illegal activities. • Material that contains sexually explicit images or descriptions. • Material that advocates or promotes intolerance for others, such as anything that could be construed as harassment or disparagement based on race, color, religion, sex, ancestry, disability, medical condition, sexual orientation, or any other characteristic protected by law. • Material that contains language that is offensive, vulgar, obscene, threatening, violent or defamatory. Cam L., Ceridian Canada 3 Acceptable Use of Assets Employees are expected to treat Ceridian assets in a professional manner in order to reduce the risk of harm or damage to our information assets, the data held within our systems, and our reputation in the marketplace. • Ceridian information must never reside outside a Ceridian controlled and secured ‘space’. Approved personal computers or approved personal mobile devices may only contain Ceridian information within Ceridian created/ secured/controlled spaces. Ceridian business should not be conducted on a personal mobile device, such as a personal cell phone. • Ceridian information must never reside on/in any other product/service/site not provided for your use by Ceridian (such as hotmail or gmail). • Use professional, polite and appropriate language in all communication both inside and outside the company. • Only Ceridian issued assets can be connected to our networks. Personal computers, network devices and other peripheral devices such as personal printers or external drives cannot be connected to our network. Vendors and contractors with non-Ceridian issued computers must utilize external guest lines to access Internet resources whenever available. • Personal USB devices (IPods, MP3s, Mobile devices) may only be connected in Charge only mode. Ceridian reserves the right to erase/reformat without authorization or warning any USB device connected to Ceridian networks or computing devices. • Only applications and software issued or approved by your business unit’s central IT services group can be used or installed on Ceridian assets. • Do not use Ceridian assets (such as hardware, software and internal tools) for any personal for profit activities or private business activities, including commercial advertising. • Gaming, on-line betting and gambling is not allowed on Ceridian assets. • Downloading music and videos onto Ceridian assets is not allowed. • Peer to peer programs, such as, but not limited to, Limewire, BitTorrent and Kazaa, are prohibited. • Posting of Ceridian intellectual property and confidential proprietary information in any public forum such as, but not limited to, online chats, messaging, blogs or any other social networking site is prohibited. & Q A Q: My manager told me I was in violation of the Acceptable Use Policy because I was listening to satellite radio using my web browser. A: True. Listening to satellite radio is an example of monopolizing system resources. Streaming audio creates a heavy demand on our network when utilized by multiple people simultaneously. This creates a violation of the Acceptable Use Policy regardless of whether the streaming audio site is not blocked by Internet proxy rules. 4 Acceptable Use of Assets, continued • Users may not deliberately monopolize resources, for example by sending mass mailings (spam) or chain letters, streaming audio or video files, spending excessive amounts of time on the Internet, or otherwise creating unnecessary loads of traffic on the network for non-business related purposes. • Reviewing the files or communications of others, also known as snooping, is strictly prohibited. • Attempting to breach any security measure or intercepting communications without proper authorization is prohibited. • Users must never intentionally represent themselves as someone else, also known as masquerading. • Desktop sharing programs such as, but not limited to, PCAnywhere, GoToMyPC or LapLink are prohibited unless they have been approved by the central IT services group. If approved, the use of such programs is limited to the purpose and function contained in the approval. • Utilize approved VPN technology to access Ceridian’s network from any other external network including home offices. • Intentionally developing programs designed to harass other users or infiltrate a computer or computing system to damage or alter the software composition is prohibited. • Users must ensure appropriate permission is obtained when copying software or information to be used at Ceridian. • Ceridian assets cannot be used for fund raising or public relation activities other than those specifically related to Ceridian activities or otherwise approved by Ceridian management. • Discussions where a user feels they need to have a disclaimer such as “this represents my personal opinion and not that of my department or Ceridian” should be avoided. • All social media communications on behalf of Ceridian must be accurate, not disclose any confidential information and must not disparage the company, its employees, customers, prospects, competitors, vendors, partners, suppliers, or products. Rebecca A., Comdata 5 Passwords and User IDs Passwords, paired with unique user IDs, act as the foundation for basic security controls. The use of generic, shared or borrowed credentials (whether from a customer or another employee) is not allowed. Employees must use passwords to access Ceridian systems or assets. This includes screensaver passwords that restrict the use of the actual workstation. PDAs must have the Security Time Out option enabled and set to not more than 10 minutes. Always use a secure password that is a combination of numbers, letters and special characters. A password must not contain any part of your name or user id, must not be a dictionary word and should not be easily guessable (such as Ceridian). The minimum password length allowed at Ceridian is 7 characters, although there are exceptions on certain legacy applications that allow 6 characters, and some business units have implemented an 8 character requirement to make the password stronger. Ceridian passwords must be changed on a regular basis. The absolute minimum is no less than once every 62 days, although most business units have implemented forced password changes more frequently. If you feel your password has been compromised contact your IT Service Desk immediately. Do not use the same user ID and password combination that you use at Ceridian on any external system, such as Internet sites that require a user id and password. This practice could make Ceridian’s information assets susceptible to unauthorized access by unknown individuals who have successfully compromised access controls used on Internet sites. & Q A Q: As a manager I am allowed to request the user ID and password of my employee’s network account only in instances when the employee is scheduled to leave the company because this will allow me to maintain the business information on the employee’s PC and any business correspondence in their email. A: False. This scenario represents use of a shared ID and password. Performing this type of activity can create segregation of duty conflicts and eliminates any personal accountability by the designated account user. Whenever possible, managers should work with affected employees to transition all business related information prior to an employee’s last day of employment. In instances of immediate terminations, managers should contact local service desk teams to assist in coordinating post-termination access to information resources. 6 Email Security • Never email sensitive or proprietary Ceridian information outside of the Ceridian network without appropriate security, such as using email encryption. Sensitive information includes any client-related information or personally identifiable information such as a Social Security number (SSN) or a Social Insurance number (SIN). Contact your local Information Protection department to identify approved methods of secure email transmissions. • Monopolizing corporate email systems for unauthorized mass email messages is prohibited. Do not use your email account to broadcast mass email or spam. • Automatic forwarding of email on Ceridian systems to an external destination is not allowed. • Personal email accounts (e.g. hotmail, gmail, yahoo, etc) may not be used for company related business. • Ceridian email may only be sent and received from Ceridian owned assets. Accessing Ceridian email from personal devices is not allowed except through the use of approved web access URLs. • Email is a communications tool, and is not to be used for information storage/retention. Information that is important enough to be stored, should be exported/moved to file shares or Sharepoint sites provided by Ceridian for data storage and collaboration. 7 Personal Use of Ceridian Assets Use of Ceridian owned assets, applications and networks is intended to be for Ceridian business purposes. However, the Company recognizes that there will be occasions when employees may wish to access the Internet via Ceridian assets or use Ceridian email for non-work related purposes, such as internet banking, travel arrangements and weather forecasts. Personal use of Ceridian assets is a privilege, not a right, and it may be withdrawn at any time if it is abused. Incidental personal use will be considered appropriate as long as: • It is not contrary to any existing Ceridian policies or the Code of Conduct. • It does not interfere with Ceridian business. • It does not interfere with productivity. • It complies with all existing laws and regulations (please remember that internet use in other countries must comply with laws in that jurisdiction). • It would be considered ethical and in good taste by any reasonable person. • It meets all other requirements of this policy. & Q A Q: My coworker noticed me buying airline tickets for my trip home over the holidays. I was told I was in violation of the Acceptable Use Policy. A: False. While Ceridian owned systems should be used mainly for business purposes, the company does recognize limited occasions when employees may access the Internet using Ceridian assets for non-work related purposes. The key to this policy is to be mindful of the time used for personal business and to use discretion so that you are not visiting sites of a questionable nature. Myline C., Ceridian Mauritius 8 Clean Desk Policy Ceridian has a clean (clear) desk policy which portrays a professional image to any visitors we may have, but more importantly to reduce the risk of security breaches, both accidental and deliberate. • During working hours necessary paperwork may be kept on your desk but confidential papers should be secured. If you leave your desk for any length of time, confidential or sensitive papers (or any other media) should be removed from your desk and locked away where possible. • Secure your laptop to your desk or workstation using the locking mechanism supplied by Ceridian where applicable. • Activate a password protected keyboard / screen lock when you are away from your desk. • Log off from your computer at the end of each day (it is also recommended that you turn off your monitor at the end of the day to reduce electricity consumption as well as to secure your system). • Ensure confidential and sensitive information that has been printed on hard copy is disposed of using confidential shredding bins or locked recycling bins when it is no longer required. • Remove sensitive or confidential information from printers immediately after it is printed. Where available, use “secure print” features on printers that require a PIN code to release a print job from the print queue at the shared printer’s location. • Always clear your desktop before you go home and put away all work into a drawer, filing cabinet or cupboard where possible. Sensitive or confidential paper should be in a locked drawer, locked filing cabinet or locked cupboard where possible. • Wipe boards clean in conference rooms after the conclusion of meetings. Remove any sensitive or confidential paper. 9 Portable Asset Protection The possibility of theft and accidental loss of portable assets presents an increased risk to Ceridian assets and the information contained upon them. Users are expected to help reduce the possibility of theft and loss, and must ensure these assets are appropriately protected within Ceridian offices, working at external sites, and during travel. Portable assets include desktop computers, laptop / portable computers, personal digital assistants (PDAs), such as Blackberry devices, and any other device capable of storing or communicating information, such as CDs, USB Memory Storage Devices or removable CD drives. All laptops at Ceridian are issued with full disk encryption. You are not allowed to remove this from your laptop. The use of other mobile devices, such as USB keys and thumb drives is not encouraged because these devices are especially susceptible to loss and theft. If you must use a portable device that contains any sensitive information, for example customer information, you must use encryption to protect this data. Portable assets must: • Be password protected. • Be secure at all times and not visible to the public during non-business hours. • Never left in vehicles overnight. • Be secure in the trunks / boots or rear security covers of vehicles. • Be secured “out of plain sight” in hotel rooms. Make use of hotel safes if available. • Never left unattended in public places such as hotel lobbies, airports, or restaurants. • Never be checked in transportation luggage / baggage systems. • Not contain confidential or sensitive information without an extra layer of security, such as encryption. If it is necessary to copy sensitive information to a mobile device for a short period of time (for example for a client visit) this information should be deleted as soon as it is no longer required. & Q A Q: It’s okay to leave my laptop in the cabin of my car when I have a quick errand to do like grocery shopping or to buy a cup of coffee because it is in a computer bag which makes it “out of plain site”. A: False. Thieves target vehicles that have an exposed incentive like a wallet, purse, or any sort of bags, especially laptop carrying cases. Laptop cases are being designed to be trendier and look more like messenger bags or even back packs and duffle bags. Regardless of a bag’s design, it will not fool a would-be criminal because they know that the contents may contain valuable items like cash, credit cards and portable computing equipment. Be sure to place your bag in the trunk/boot of your vehicle ahead of time and not while in the parking lot of your final destination so that an observing thief does not take notice. 10 Facility Protection All employees are issued an ID badge, and are expected to display their badge while on Ceridian premises. Never lend out your badge to other people. All guests to Ceridian must sign in at the central building entrance. Anyone requesting access to your building or office space should be directed to the sign in desk — never allow an individual into secure areas of your building. All Ceridian guests that are allowed into a secure area of the building must be escorted by a Ceridian employee at all times. Protection of Confidential Information All information relating to customers and their employees, clients and consumers must be treated with the strictest confidence. Ceridian is a custodian of customer/client data collected as part of providing our services — Ceridian is not the data owner. Information that is obtained from customers or consumers, or from third parties on behalf of our customers, must adhere to the following guidelines: • The information we collect is to be used only for its original intended purpose at the time it was collected. • We will not use real customer data, or production data, for testing unless an exception has been granted by the local information protection department, and a documented approval has been obtained by the data owner (e.g. Ceridian customers and clients). • We only collect information from our customers that we require to fulfill our contractual obligations. • We do not share any information with any third party other than third parties that are used to fulfill our service obligations to our customers (or as required by law). • Personal information is protected by security safeguards appropriate to the sensitivity of the information. Privacy Legislation The collection, storage, use, disclosure of, and the transfer of personal information is subject to specific privacy legislation and restrictions in certain jurisdictions, such as Data Protection / Privacy Acts in Canada (PIPEDA) and European countries (for example the Data Protection Act in the UK.) This includes both personal information as well as information collected about other individuals as part of normal business responsibilities. If you have questions regarding the protection of personal information, particularly around the transfer of personal information outside of your country, you should seek advice from your supervisor, your local Information Protection department or your legal department. Additional details are available in business unit specific privacy policies. 11 Other Requirements Conference Calls and Web Meetings • When chairing a Ceridian conference call or Web meeting, confirm that all participants are authorized to participate. • When sending an invitation to a Ceridian teleconference call, do not reveal the moderator code to all participants. • When receiving an invitation to a Ceridian teleconference call, particularly calls of a confidential nature, ensure that the participant pass code is not revealed to unauthorized people. • Permanent moderator codes are the responsibility of the owner. The owner of the code will be responsible for all use credited to that code. Backup of Data Stored Locally Information that is stored on the local drive of any workstation is not necessarily backed up. To ensure that data is available when you need it, store important files on a network drive that is being backed-up by your local IT Services group. (Note: some laptops and workstations are backed up in the US Payroll business unit. Check with your local IT support group to determine if you have this software running). As described in the Portable Asset Protection and Protection of Confidential Information sections, confidential or restricted information should never be stored locally except as noted for short term requirements and only if encrypted. Classification of Data All information generated and maintained within Ceridian is classified into a category ranging from Restricted to Public Use. Classifications are based on risk of the information and special security requirements and have been documented for each class. Please see your local business unit’s Asset Management Policy, Data Classification Standard or Data and Records Retention Policy for further information. Christy R., SVS 12 Other Requirements, continued Remote Desktop Tools Remote desktop software, also known as remote access tools, provide a way for computer users and support staff to share screens, diagnose issues or demonstrate procedures on another computer. While these tools can save significant time and money by eliminating travel and enabling collaboration, they also provide a back door into the Ceridian network that can be used for theft of, unauthorized access to, or destruction of assets. As a result, only approved, monitored, and properly controlled remote access tools may be used. • Users may only accept remote support from authorized support groups. At this time only internal technology support groups (such as internal service desks) are authorized to support Ceridian users in such a manner. Users may not accept such support from any external agent or group, where external means any group outside of Ceridian. • All remote support actions must be monitored by the equipment user/owner. • Remote PC Support services may only be provided to a customer with the customer’s explicit permission and the remote session will be terminated permanently once the support issue is resolved to the customer’s satisfaction. Support personnel must exercise the utmost discretion and professionalism. • Only the specifically authorized actions and support can be provided. Snooping, general browsing for unrelated issues or any navigation other than the minimum required to solve the specific issue being supported is strictly prohibited. 13 Other Requirements, continued Data and Records Retention All information generated and maintained within Ceridian must have a specific retention period. Ceridian retention periods comply with all legal, regulatory and contractual requirements. Ceridian will promptly dispose of data and records that have outlived operational usefulness, unless retention is required by law, regulation, or rule. As soon as retention periods are exceeded, reasonable efforts must be made to ensure data and records are destroyed using approved disposal methods (please check your local information security policy for data and document destruction requirements). Archive or contingency storage may only be maintained for periods required by network backup and operational contingency as defined by service continuity requirements. It is your responsibility to ensure that any data under your control complies with data and record retention requirements. Need to Know Basis All information within Ceridian must be treated with the “need to know” principle. Basically this means that information must only be shared with those that need to know it in order to fulfill their job obligations. All users are responsible for ensuring that information within their control is only shared with other Ceridian users that have a valid requirement to have the information or data. Telephones / Cellular Phones / FAX Users are cautioned that cell phones are less secure than land lines and should therefore take appropriate action when discussing highly confidential information. Also, ensure that confidential conversations cannot be overheard and be cautious of telephone conversations held outside of Ceridian premises. Keep in mind that voicemail systems are not always “private” so discretion should be used when leaving voice messages. When sending confidential documents via FAX, verify you have the correct phone number of the destination. If you are receiving confidential information by FAX, request advance notification by the sender so that you may retrieve documents from FAX machines as they are printed. Where possible, utilize FAX technology that routes documents directly to your company email account or other secure fax imaging system. 14 Reporting Security and Privacy Incidents Users are our first line of detection for security incidents. Early detection and reporting will permit appropriate countermeasures to be implemented. All security related incidents must be reported immediately to your IT Service Desk using the normal contact process within your business unit or the email contact information in the Questions and Comments section of this policy. The IT Service Desk will contact the appropriate incident response team immediately before conducting any investigation. In the event of a breach of security, all events and actions will be documented and handled internally by the appropriate Security Incident Response Teams. Under no circumstances are users to discuss security incidents with other Ceridian employees, customers, the media or law enforcement without Ceridian senior management approval. Only authorized individuals may speak to the press, law enforcement, or other external sources. Any user who is aware of a violation of any Ceridian security policy is obligated to report the violation, either to your help desk, your manager, your information protection team, your legal department, the Ethics Hotline, or Ethicspoint.com. & Q A Q: I lost my travel bag containing some customer information, but my computer is still with me. Therefore, I don’t have to report this as a security incident because the loss did not affect an IT resource. A: False. Physical documentation is considered an information asset. If you suspect the theft or loss of any information asset, especially those containing sensitive information, you must report this incident to the IT Service Desk and/or local Information Protection team. 15 Questions and Comments Questions and comments regarding this policy can be sent to your local Information Protection team using the contact information below. • US & Mauritius (including Dayforce): [email protected] • Canada (including Dayforce): [email protected] • Comdata and Stored Value Systems: [email protected] • UK & Ireland: [email protected] 16 About Ceridian Ceridian is a global product and services company delivering trusted results and transformative Human Capital Management technology. We help organizations save time and money, increase employee engagement and productivity. Our offering includes payroll, benefits, tax services, human resources including Dayforce Human Capital Management, Employee Assistance Programs and compliance. As the driving force in payment innovations, we are the leader in payroll outsourcing, gift cards and corporate expense management. Our award-winning products and services deliver trusted results to more than 140,000 customers in 52 countries. For more information about Ceridian visit www.ceridian.com or call 800-729-7655. This document contains information that is proprietary and trade secret to Ceridian Corporation and is intended solely for the use of our customers and prospects in evaluating Ceridian solutions. This document is not to be duplicated or distributed in printed or electronic format without the prior written consent of Ceridian Corporation. Ceridian 3311 East Old Shakopee Road Minneapolis, Minnesota 55425 800-729-7655 www.ceridian.com Stored Value Solutions ©2012 Ceridian Corporation. All rights reserved. Printed in USA E08406-002 10/12 LR
Similar documents
CERIDIAN
The Funds Summary indicates the total payment due to Ceridian for the payroll and services. If applicable, it may also include certain Trust reports, such as the Stop Payment Confirmation Report an...
More information