BizLink ensures the security of the Company Users’ access, its accounts and transactions, through the following:
Secure Access: Access to Bizlink requires a valid Corporate Code, User ID, and the corresponding password. Users are required to change the initial password after log-in. Multiple logins using the same user ID is not allowed and would cause one of the users to be logged off. After a prescribed time of inactivity, a user is automatically logged off. Passwords have to be changed after a specific number of days and may not be repeated until after the fifth password change. A password is locked if the user commits three (3) consecutive or ten (10) accumulative failed attempts.
Transaction file upload: BizLink validates the total amount and the total count declared in the file’s header versus the actual details in the file. During message transmission, BizLink encrypts the data passed from the client to the servers and vice-versa to ensure it is not corrupted, tampered and/or forged. The message requests are validated every time on a per user and per session basis to ensure data integrity. The records captured from the file are displayed to the user and can be reviewed prior to submission/approval. A mirror of the upload file is saved in the server for future reference.
Transaction Controls: BizLink has built-in access controls for each user. A user could either be a Maker, a Verifier, or an Authorizer. The Maker creates the financial transaction, the Verifier, if applicable, serves as a first level reviewer, while the Authorizer authorizes it. Financial transactions require a Maker and at least one Authorizer before the transaction is effected. Authorizers must use the BizLink mobile app to approve a financial transaction and they are subjected to the same approval limits and multiple levels of approval nominated by the company for BizLink transactions ensuring compliance to the company's approval heirarchy. Given this, Authorizers may be classified by signature category and have limits on the total amount of transactions they can approve within the day. Companies can have up to three signature categories. Different levels of transaction amounts may require different signature rules.
Data Encryption: Strong 256-bit encryption via HTTPS, with session keys dynamically generated at each connection request provides for session confidentiality