Compliance with Laws and Regulations:Users of Cedur software must comply with all applicable laws,
regulations, and industry standards related to payroll processing, tax reporting, and data privacy. This includes
but is not limited to laws such as the tax laws, and data protection regulations.
Data Privacy and Confidentiality: Users of Cedur software must ensure the privacy and confidentiality
of employee data. This includes taking appropriate measures to protect sensitive information from unauthorized
access, use, or disclosure. Users should adhere to data protection laws and regulations, and implement security
measures such as strong passwords, encryption, and access controls.
Accurate and Timely Data Entry:Users are responsible for providing accurate and up-to-date employee
data, including personal information, employment details, and payroll-related information. Users should verify the
accuracy of data before processing payroll to avoid errors or discrepancies.
Use of Authorized Data:Users must ensure that they have the necessary rights and authorizations to
use the data entered into Cedur software. Users should not enter or process data without proper authorization or
consent from the individuals concerned.
Non-Disclosure of Software Access Credentials: Users must keep their login credentials and any other
access information for Cedur software confidential. Sharing of login information or allowing unauthorized
individuals to access the software is strictly prohibited. Each user should have their unique login credentials.
Backup and Disaster Recovery: Users should regularly back up their payroll data and implement
appropriate disaster recovery measures. This helps ensure data integrity and availability in case of system
failures, natural disasters, or other unforeseen events.
Prohibited Activities: Users must not use Cedur software for any illegal, unethical, or fraudulent
activities. This includes but is not limited to unauthorized access to data, attempts to modify or delete records
without proper authorization, or using the software for purposes other than business payroll processing.
Support and Updates: Users should keep the software up to date by installing the latest updates and
patches provided by the software vendor. Users should also seek technical support from the vendor or authorized
support channels when encountering issues or questions related to the software.
Training and Competence: Users should possess the necessary skills and knowledge to operate Cedur
software effectively. Adequate training should be provided to users to ensure they understand how to use the
software and comply with relevant policies and procedures.
Liability and Indemnification: Users are solely responsible for their use of Cedur software. The software
vendor or provider shall not be held liable for any direct or indirect damages, losses, or legal disputes arising
from the user's actions, including but not limited to errors in data entry, processing, or any non-compliance with
laws and regulations.
User Access Controls: Users should be assigned appropriate access levels and permissions based on
their job roles and responsibilities. Access to sensitive payroll data and system settings should be restricted to
authorized individuals only. Regular reviews of user access should be conducted to ensure that access rights are
aligned with current job roles.
Record Retention and Disposal: Users should adhere to record retention policies and legal
requirements for retaining payroll records. Cedur software may provide options for archiving or deleting old records
based on predefined retention periods. Users should follow these guidelines to ensure compliance with applicable
laws and regulations.
Change Management: Users should follow proper change management procedures when making any
modifications or updates to Cedur software configuration, such as changes to tax rates, deduction rules, or employee
information. All changes should be documented, tested, and implemented following a structured change control process
to ensure accuracy and minimize disruptions.
Prohibited Software Modifications: Users are restricted from modifying Cedur software's source code,
database structure, or any other components without explicit permission from the software vendor or authorized
personnel. Unauthorized modifications may lead to system instability, data corruption, or other undesirable
consequences.
Reporting and Documentation: Users should generate accurate and comprehensive payroll reports as
required by their organization's policies, legal obligations, and regulatory authorities. Users should retain these
reports securely and make them available for internal and external audits, as well as for any legal or compliance
requirements.
Vendor Support and Maintenance: Users should maintain a valid support contract or agreement (included
in the subscription) with Cedur software vendor to receive necessary software updates, bug fixes, and technical
assistance. Users should promptly install recommended updates and patches to ensure the security and stability of
the software.
Disaster Recovery and Business Continuity: Users should develop and maintain a disaster recovery plan
that includes procedures for data backup, system restoration, and business continuity in case of unforeseen events
such as natural disasters, cyber-attacks, or system failures. Regular testing of the plan should be conducted to
validate its effectiveness.
Training and Awareness: Users should participate in ongoing training and educational programs to
enhance their understanding of payroll processing, tax regulations, and software usage. This includes staying
informed about changes in laws or regulations that may impact payroll practices and adapting the use of the software
accordingly.
Non-Discrimination and Equal Opportunity: Users should process payroll in a fair and unbiased manner,
ensuring equal treatment for all employees regardless of their race, colour, religion, sex, national origin, age,
disability, or any other protected characteristic. Users should follow applicable anti-discrimination laws and
regulations.
Conflict of Interest: Users should avoid any conflicts of interest that may compromise the integrity
of Cedur processing. This includes refraining from engaging in activities that could result in personal gain or
favouritism at the expense of accurate and fair payroll calculations.
Dispute Resolution: In the event of any disputes or disagreements related to Cedur software, users
should follow established dispute resolution procedures, which may include mediation or arbitration. Users should
aim to resolve issues in a timely and professional manner to minimize disruptions to payroll operations.
Training Materials and Documentation: Users should utilize training materials and documentation
provided by the software vendor or authorized sources to enhance their understanding of Cedur software. Users should
not distribute or reproduce these materials without proper authorization to maintain their integrity and
accuracy.
Communication and Transparency: Users should communicate any known issues, errors, or discrepancies
related to Cedur software promptly to the appropriate stakeholders, such as HR personnel, supervisors, or system
administrators. Open and transparent communication helps in resolving problems effectively and maintaining trust
among users and stakeholders.
Continuous Improvement: Users should actively contribute to the improvement of Cedur software by
providing feedback, suggestions, or reporting any software bugs or usability issues to the software vendor or
support team. This helps in enhancing the functionality, usability, and overall performance of the software.
Social Engineering Awareness: Users should be vigilant and aware of social engineering techniques
that could be used to gain unauthorized access to Cedur software or sensitive employee information. Users should
report any suspicious requests for information or attempts to deceive or manipulate them to appropriate security
personnel.
Termination or Change of Employment: Users should promptly inform the appropriate personnel or system
administrators when an employee's employment is terminated or their job roles change. This ensures that access
rights and permissions are updated or revoked in a timely manner to prevent unauthorized access to Cedur
software.
Third-Party Service Providers: If users engage the services of third-party providers for
payroll-related activities, such as tax filing or benefits administration, they should ensure that these providers
adhere to applicable laws, regulations, and industry standards. Users should enter into appropriate agreements with
third-party providers to protect the confidentiality and security of employee data.
User Responsibility for Third-Party Integration: If users integrate Cedur software with other systems
or software applications, they are responsible for ensuring the compatibility, security, and proper functioning of
such integrations. Users should follow best practices and guidelines provided by the software vendor or authorized
experts when integrating the software with external systems.
Monitoring and Auditing: Users should be aware that Cedur software may include monitoring and
auditing features to track user activities and system usage. Such monitoring is essential for ensuring compliance,
detecting unauthorized access, and maintaining the integrity of Cedur process. Users should not attempt to
circumvent or disable these monitoring mechanisms.