INFORMATION AND RESOURCES
Security Features
Fareclock uses strong administrative, technical, and physical security measures to help protect personal information from loss, misuse, unauthorized access, or disclosure.
Role-Based Access Controls (RBAC)
- Employers can assign permission levels according to function
- Administrator access is restricted based on approved permissions
Authentication & Administrative Security
- Administrator accounts support multi-factor authentication (MFA) and two-step verification
- Required password policy and login requirements
- Configurable authentication providers and verification settings
Biometric Verification Protections (Optional)
- Face recognition helps prevent buddy punching
- Liveliness detection and anti-spoofing protections
- Detect replays, videos, and screen-based tricks
- Biometric data can be deleted by authorized admins
Geolocation Controls (Optional)
- GPS data collected only at clock-in/clock-out
- Optional continuous live tracking only if enabled
- Configure controls to block missing location data
- Detect fake GPS data or spoofed device location
Audit Logs & Monitoring
- Log administrative actions and access activity
- Track suspicious behavior and failed login attempts
- Audit reporting for compliance and investigations
Device & Application Security
- Optional device binding to link user to a specific device
- Detect tampering and duplicate app installs
- Block rooted devices or airplane mode
- Set up lock controls until admin review or unlock
Fraud & Abuse Prevention
- Detect unusual login activity and suspicious punches
- Flag fake GPS and timestamp manipulation attempts
- Enable alerts for face verification mismatches
- Security notifications for critical account changes
Data Encryption
- Data transmitted securely using SSL/TLS encryption
- Sensitive information protected during transmission
Secure Cloud Infrastructure
- Hosted on Google Cloud secure-by-design infrastructure that is built on widely recognized compliance frameworks (SOC, ISO, PCI, etc.)
Data Retention & Deletion Controls
- Configure retention periods and permanently delete user data
- Organization or user data is deleted 30 days after it becomes inactive
Penetration Testing & Security Audits
- Regular security testing by external specialists
- Vulnerability assessments and remediation processes
Automatic Updates & Patch Management
- Security patches pushed to apps and backend systems to help ensure protections stay current without customer action
Worker Privacy Controls
- Consent prompts for location or biometric collection for transparency into what data is collected and why
Secure Payment Processing
- Payments processed via Stripe
- No raw credit card data used for timekeeping operations











