Frequently Asked Questions
Check out the questions and answers below for more information about One people
What is One people?
We put employees first with a cloud-based suite of HR & Payroll solutions called One People. We provide you with a powerful HR Information System, Payroll, as well as tools for onboarding, learning, performance management, and people analytics.
One people consists of what modules?
- Core HR
- Employee Hub
- Time Tracking
- Payroll
- Talent
- Performance
Is it possible for One people to integrate with third-party applications?
- API
- File Exchange (CSV files, Excel files, and everything else..)
- Web Services
For how many employees does the minimum requirement apply?
How frequently am I billed by One people?
How does One people accept payments?
How does One people handle cancellations and refunds?
Approximately how long does it take to set up One people?
Where is my data stored? What level of security does One people offer?
Microsoft Azure West Europe data center in the Netherlands hosts One People customer data. Sensitive fields are encrypted in transit, and the data center uses advanced encryption techniques at rest. Furthermore, the data center located in Netherlands meets the data requirements of the European Union, the European Economic Area, Switzerland, and the United Kingdom.
Among the measures we take to prevent data leaks and unauthorized access are:
- Data security with multiple levels of defense
- Regular vulnerability scanning
- Web application firewall
- SOC II audits by third parties
- Penetration tests annually
Where is my data stored? What level of security does One people offer?
Microsoft Azure West Europe data center in the Netherlands hosts One People customer data. Sensitive fields are encrypted in transit, and the data center uses advanced encryption techniques at rest. Furthermore, the data center located in Netherlands meets the data requirements of the European Union, the European Economic Area, Switzerland, and the United Kingdom.
Among the measures we take to prevent data leaks and unauthorized access are:
- Data security with multiple levels of defense
- Regular vulnerability scanning
- Web application firewall
- SOC II audits by third parties
- Penetration tests annually