Our Story
Table of Contents
Who We Are: An Australian Success Story
In the world of HR software, we’ve always been one of the leading industry providers of innovative solutions. We’ve relentlessly pushed the boundaries of HR technology for close to two decades, creating a proud and passionate Australian business born from the need to answer questions that nobody else has asked.
Our journey has always been shaped by our history. Since 1996, we’ve grown from an Australian startup into a company that services over 90,000 users across four continents, and we’re proud of how far we’ve come.
It All Started with a Problem
Inspired by a 1996 paper on the impact of workflow on HRMS, our founders, Craig Macdonald and Ron Schroeder, identified a massive gap in the Australian market. At the time, many payroll engines simply didn’t take advantage of emerging internet technology. This meant web-based solutions for work flowing employee-facing transactions didn’t exist. Everything was paper or email-based.
With a determination to do better, the pair saw an opportunity and bootstrapped a development platform to build and control workflow. As a result, the V1 EC workflow engine and Employee Self Service platforms were created as an extension of traditional payroll systems. Immediately popular, these engines became resellers – highlighting the value that the new EmployeeConnect business could offer the Australian business community.
“An unconventional philosophy is something we’re deeply proud of. We’re not afraid to go against the grain; our goal is to build a company that fundamentally changes the way that people interact with software.”
Craig Macdonald, Founder Tweet
Develop. Diversify. Disrupt.
From this point, our business has stood strongly and determined in the face of the ever-changing world of technology. We quickly realised that our HR development platform was in fact the real driver for bespoke, workflow-driven intranets. This allowed us to extend beyond payroll and into the full spectrum of HR transactions, resulting in the first version of our HR software.
As a genuine and proud member of the APAC community, we have embraced these changes to develop an extensive product suite for our current clients and partners. We are committed to solving business issues in an interactive, innovative, and smart way. At our core, what we do is not a job. It’s our fire and it keeps us moving forward.
Solving Your Unsolvable
At EmployeeConnect, we believe in a different way of working. It’s an unconventional philosophy that sets us apart and fuels our obsession with customer success. While many providers offer a one-size-fits-all solution, we provide a boutique service built on empathy and transparency.
We engage with your unique business issues, goals, and objectives, using our empathy to design forward-thinking processes that truly fit your needs. With few closed doors and a culture of radical transparency, we aim to ensure that you are included and involved in every major decision. This approach is what allows us to celebrate our clients’ successes and is the hallmark of a healthy partnership. It’s why our average client tenure is more than seven years.
Why Choose EmployeeConnect?
We are a Genuine Australian Story: A proud member of the APAC community with a decades-long history of solving real-world business problems.
We Put Customers First: We are obsessed with customer success and thrive on the “Can you…?” questions that have shaped our platform.
A Truly All-in-One Solution: We are a leading workflow-driven HRIS that seamlessly integrates all your payroll, recruitment, and HR functions.
We are Future-Proof: Our mission is to be the best-of-breed HRIS in the world, constantly improving our toolbox of solutions so you never have to settle for less.
John H.11/03/2025Trustindex verifies that the original source of the review is Capterra. Great application Overall: Excellent experience. Very happy with the outcome. Pros: Great tool and very engaging implementation team Cons: Lost of customisation required but in the end it gave us a better outcome. jamal C.10/02/2025Trustindex verifies that the original source of the review is Capterra. exceptional review Overall: The hyper-intuitive UX? Flawless. The unparalleled scalability? Revolutionary. The robust security? Military-grade. Every feature is a paradigm shift in digital excellence, effortlessly revolutionizing Pros: I've used a lot of software in my time, but THIS… THIS is the pinnacle of human innovation. Cons: From the moment I installed it, my life changed forever. The cutting-edge AI-driven interface and seamless cloud integration make it feel like you're operating in a future we don't even deserve yet. Mardi E.16/10/2024Trustindex verifies that the original source of the review is Capterra. Excellent all round. Overall: Excellent. I am incredibly impressed with the product and the training team. [sensitive content hidden] particularly need a big thank you for such great support. They explain things really well, they are always available, they are lovely to deal with and very patient - attending to any needs we have. Pros: Very supportive training and great back up when you go live so you know you have people to rely on to assist you. The ease of using this program for Managers and Employee has a great response and Managers are keen to use the system. Cons: For the person in charge of the highest security there is a bit to learn but once you learn, it all makes sense and works in a logical and sequential order. Just (with all systems) there is a bit to learn. I think the Knowledgebase could be easier to look things up. Maureen P.19/03/2024Trustindex verifies that the original source of the review is Capterra. Words from a Newbie to the System Overall: It has been an amazing journey to get up and running and we are not finished yet. While we are in and working there are still some modules to go before we are fully functional. Our support teams from Employee Connect know their stuff and it's a bit frightening when they appear to read your mind! It's been fun and frustrating at the same time, you need to take the time to get the inputs right to be able to get the outputs you're looking for. We have learned a lot along the way. As we do put more modules on we will see why having a one-stop shop was worth the effort. We had thought the time zones would be a problem but they in fact work well for us - we do in the day and cross with Australia which means answers in our inbox the following morning; while working with [sensitive content hidden] in his time zone was just as good - he worked while we slept and vice versa so responses were there ready when we started our day. Pros: Incorporating the modular format to encompass HR system and Health and Safety in an easy to use platform. Cons: Some of the reporting functions we had been use to we will need to look at how best to create in Employee Connect. Ruza M.14/09/2023Trustindex verifies that the original source of the review is Capterra. EC Review Pros: The system is easy for employees to navigate, and the implementation was a supportive process. Cons: Better customization with contracts and letter variations. Julianne O.30/08/2023Trustindex verifies that the original source of the review is Capterra. EmployeeConnect - A positive impact to the way we work. Overall: Overall, we feel that EC is going to have a positive influence over the way we work. Getting started with setting up with our system certainly identified areas in which we needed to improve/build on. We were looking for a way forward, a program in which allowed our business to improve the employee’s experience, move with the times, be able to closely monitor employment history and terms and conditions, and as a company we also pride ourselves with our goal to be the best, so this certainly gives us that point of difference to our competitors within the industry. Pros: - Ability to share company’s documents – AMAZING- Being able to have Subcontractors recorded within the system too- Being able to have multiple companies set up- Moving forward the new way to handle our team’s information and track changes etc- Workflows – being so customisable- Being able to customise the system to the way we work – IT team/Development Team setting up additional alerts for us Cons: Mobile App - ability to have within the app would be good. Some minor integration costs that weren't noted within the contract. Inability to merge electronic signature onto signed/accepted docs. Rebecca K.17/08/2023Trustindex verifies that the original source of the review is Capterra. A great HR system Pros: EmployeeConnect is a user friendly system and an effective one stop shop for all our HR needs so that we don't need to use multiple systems/platforms. We are also given friendly and quick support by the team. Cons: There are no significant cons that I can identify. Every system has its limitations so just stay realistic. Wendy B.08/08/2023Trustindex verifies that the original source of the review is Capterra. EmployeeConnect Review Overall: The EmployeeConnect team played a pivotal role in assisting us with the redesign of our employee lifecycle programs and experiences, they took the time to understand our business needs and collaborated with us to tailor the product to align with our requirements. Pros: The EmployeeConnect software has significantly enhanced our employee lifecycle programs, resulting in heightened process efficiency through workflow automation and a user-friendly interface that makes it easy to use and navigate. Would highly recommend! Cons: The integration with KeyPay requires continued development, with ongoing efforts aimed at automating the workflow for employee lifecycle changes. Once this is finalised it will create a seamless connection between HR processes and payroll functions. Tara F.27/07/2023Trustindex verifies that the original source of the review is Capterra. All your HR needs in one place Pros: We mainly use Employee Management (onboarding, offboarding and movements). We have templates in the system and it's easy to select the changes from a few drop down menus and apply the changes. The onboarding process for employees is also great, allowing digital signatures & monitoring of onboarding completion. It's great at empowering employees to have the ability to change their own personal information securely and confidently as well as the ability to apply for leave. We will be looking to implement more features in the near future. Cons: Some of the system management functionality can be difficult to find and there is limited access to update business processes that we can change ourselves. EmployeeConnect only integrates with KeyPay overnight, would prefer integration occurs more often or even instantly, however, saying that you can force integration manually. Jessica K.11/07/2023Trustindex verifies that the original source of the review is Capterra. User Friendly Pros: Onboarding is much more smoother since we signed up to EmployeeConnect. Cons: I feel like the reporting function can be improved. Layout out of reports etc.Capterra rating score: 4.6 of 5, based on 28 reviewsVerified by TrustindexTrustindex verified badge is the Universal Symbol of Trust. Only the greatest companies can get the verified badge who has a review score above 4.5, based on customer reviews over the past 12 months. Read more
How We Deliver:
At EmployeeConnect, we’ve designed our entire product suite to make your journey to cloud HR as smooth and painless as possible. We know that a successful implementation is the key to unlocking the full value of your new HR system. That’s why we partner you with a dedicated consultant committed to translating your objectives into a seamless and simple roll-out.
A Tailored Approach for Every Business
We understand that one size doesn’t fit all. We offer a tailored implementation approach to match your business needs, no matter the size or complexity.

For Our Core Solutions
We’ve developed a streamlined, simple roll-out plan that gets you up and running with your HR system in a matter of days. Your consultant will be on hand for initial configuration and to assist with data uploads.

For Pro & Enterprise Solutions
We use a robust, well-documented methodology built on PRINCE2 project management principles. This approach is designed around your specific project requirements, providing improved guidance and management every step of the way.
The Process...
Your Roadmap to a Successful Go-Live
We turn a complex process into a clear, predictable journey. Here are the key phases of our implementation roadmap:
Scoping Your Success: We begin with an in-depth requirements session where we agree on the forms, reports, and workflows to be deployed. This is all documented in a detailed Statement of Work with clear timeframes.
Planning the Project: We collaborate with you to build a comprehensive project plan, jointly identifying the sequence of modules, key events, and required resources and timeframes.
Building Your Solution: Our team builds your HR solution based on the signed Statement of Work. During this phase, we identify any infrastructure requirements and assign responsibilities to ensure a smooth launch.
Administrator Training: We provide comprehensive training to your administrators, ensuring they are fully equipped to manage the system.
Rigorous Testing: This phase includes functional and user acceptance testing based on the detailed Statement of Work, giving you peace of mind that your system works as expected.
Go-Live: The system is made available to your entire team for login and use. We ensure the transition is seamless and your team is ready to go.
Post-Launch Review: After go-live, we conduct a final review to ensure the product has delivered the benefits identified in your business case and to agree on any required follow-up actions.
Committed to Your Long-Term Success
Our commitment doesn’t end when you go live. The post-implementation review ensures we’ve delivered on our promise and that you’re getting real value from your investment.
To learn more about how we can make your implementation a success, feel free to get in touch with our friendly team.
Why You Can Trust Us:
Security is Our Commitment: ISO 27001 Accredited
At EmployeeConnect, we understand that trust is built on security. That’s why we’re proud to be ISO 27001 accredited, the highest global standard for information security management. This certification is our promise to you that your data is protected by industry-leading practices, giving you peace of mind to focus on your people.
Our Key Security Pillars
We protect your data across every layer of our platform, from our physical infrastructure to our user access controls.

Data Centre & Physical Security
We leverage Microsoft Azure’s world-class data centres, which are designed for maximum resilience and security.
Global Infrastructure: Your data is hosted in strategically located Azure data centres with geographical redundancy.
Physical Protection: Each location is secured with multi-layered physical defences, including perimeter fencing, security guards, biometric access controls, and video surveillance.
Environmental Resilience: The data centres are built to be resilient against environmental threats, with fire suppression, advanced cooling, and redundant power supplies.

Data Protection & Privacy
We protect your data throughout its lifecycle with rigorous controls and a commitment to privacy.
Encryption Protocols: All data is encrypted, both in transit (using TLS encryption) and at rest (using industry-leading encryption standards).
Role-Based Access (RBAC): We apply the principle of “least privilege” to ensure employees only have the minimum access necessary to perform their jobs.
GDPR & Compliance: We are fully compliant with GDPR and other relevant privacy regulations, ensuring your data is handled lawfully and transparently.

Proactive Threat Management
We continuously monitor our systems to identify and neutralise threats before they can impact your business.
Intrusion Detection: Advanced intrusion detection and prevention systems are in place to monitor all network traffic and identify suspicious activity in real-time.
Incident Response: We have a dedicated incident response team that follows a structured plan to contain, eradicate, and recover from security incidents promptly.
Continuous Monitoring: We continuously track our security performance against established metrics to ensure our controls remain effective against new and emerging threats.
Compliance & Trust
Our commitment to security is independently verified through rigorous audits and certifications.

ISO 27001 Certified
Our entire Information Security Management System (ISMS) is certified by an independent third party, providing you with verifiable assurance of our security posture

Third-Party Audits
We and our partners at Azure undergo regular third-party audits (e.g., SOC 1/2/3) to verify compliance with global standards.

Internal Audits
We conduct our own regular internal audits to ensure we consistently adhere to our security policies and controls.
How we keep your data safe:
1. Governance and Risk Management
1.1 Information Security Management System (ISMS)
Our ISMS is the cornerstone of our security strategy, based on the ISO 27001 standard. It provides a structured approach to managing information security risks and ensures continuous improvement in our security practices.
- Leadership and Commitment:
- Our senior management is fully committed to the ISMS, ensuring that adequate resources are allocated for its implementation and maintenance. Regular management reviews are conducted to assess its effectiveness and alignment with business objectives.
- Scope of ISMS:
- The scope of our ISMS covers all information assets, including data, people, processes, and technology, across all locations and departments.
1.2 Risk Assessment and Treatment
- Risk Identification:
- We conduct comprehensive risk assessments to identify potential threats and vulnerabilities to our information assets. This includes identifying both external and internal risks that could impact the confidentiality, integrity, and availability of data.
- Risk Evaluation:
- Risks are evaluated based on their likelihood and potential impact. We use a risk matrix to prioritise risks, ensuring that the most significant threats are addressed promptly.
- Risk Treatment Plan:
- For each identified risk, we develop a treatment plan that includes implementing appropriate controls, accepting the risk, transferring it, or mitigating it through alternative measures.
- Residual Risk Management:
- After implementing controls, residual risks are reassessed to ensure they fall within acceptable levels. Ongoing monitoring and review processes ensure that risk management remains effective over time.
2. Azure Data Centre Security
2.1 Physical Security
- Data Centre Locations:
- Azure data centres are strategically located worldwide, offering geographical redundancy. Each location is equipped with state-of-the-art physical security measures, including perimeter fencing, security guards, biometric access controls, and video surveillance.
- Environmental Controls:
- The data centres are designed to be resilient against environmental threats. This includes fire suppression systems, advanced cooling systems, and redundant power supplies to ensure continuous operation even during extreme conditions.
2.2 Network and System Security
- Network Segmentation:
- Azure employs network segmentation to isolate critical systems and limit the spread of potential attacks. This ensures that even if one segment is compromised, others remain secure.
- Intrusion Detection and Prevention:
- Continuous monitoring and advanced intrusion detection systems are in place to identify and prevent unauthorised access. Any suspicious activity is flagged and responded to in real-time.
- Encryption Protocols:
- All data stored within Azure is encrypted using industry-leading encryption standards. Data in transit is secured using TLS encryption to prevent interception and unauthorised access.
2.3 Compliance and Auditing
- Third-Party Audits:
- Azure undergoes regular third-party audits to verify compliance with global standards such as ISO 27001, SOC 1/2/3, and GDPR. These audits provide independent assurance of Azure’s security posture.
- Internal Audits:
- We conduct regular internal audits to ensure our own adherence to security policies and controls. Any non-conformities are addressed promptly through corrective actions.
3. Access Control and User Management
3.2 User Management
- Onboarding and Offboarding Processes:
- Access controls are tightly integrated with our HR processes. New employees are granted access based on their roles, and all access is immediately revoked upon termination or role change.
- Monitoring and Logging:
- All access to sensitive data and systems is logged and monitored. Logs are regularly reviewed for suspicious activity, and alerts are generated for any unauthorised access attempts.
4. Asset Management
4.1 Asset Inventory
- Comprehensive Asset List:
- We maintain a detailed inventory of all information assets, including hardware, software, data, and personnel. Each asset is classified based on its sensitivity and criticality to business operations.
- Ownership and Responsibility:
- Each asset is assigned an owner responsible for its security. Asset owners are accountable for implementing and maintaining appropriate security controls.
4.2 Asset Classification and Handling
- Data Classification Policy:
- Data is classified into categories such as public, internal, confidential, and restricted. Each classification level has specific handling requirements to ensure that data is appropriately protected.
- Data Lifecycle Management:
- We have established processes for data creation, storage, use, sharing, and destruction. These processes ensure that data is managed securely throughout its lifecycle.
5. Information Security Incident Management
5.1 Incident Response Plan
- Incident Detection:
- We utilise advanced monitoring tools to detect potential security incidents in real-time. These tools are configured to alert our security team immediately upon detection of any suspicious activity.
- Incident Reporting:
- Employees are trained to recognise and report security incidents promptly. A formal reporting mechanism is in place to ensure that incidents are documented and escalated as necessary.
5.2 Incident Handling and Resolution
- Incident Response Team:
- Our dedicated incident response team is responsible for managing and resolving security incidents. The team follows a structured process to contain, eradicate, and recover from incidents.
- Post-Incident Review:
- After an incident is resolved, a thorough post-incident review is conducted to identify root causes and lessons learned. This information is used to improve our security posture and prevent future incidents.
6. Compliance and Legal Requirements
6.1 Regulatory Compliance
- GDPR Compliance:
- We are fully compliant with GDPR, ensuring that personal data is processed lawfully, fairly, and transparently. We have implemented processes to uphold data subject rights and to manage data breaches in accordance with regulatory requirements.
- Industry-Specific Regulations:
- In addition to GDPR, we comply with other relevant industry regulations, such as HIPAA for healthcare data and PCI-DSS for payment card data. Compliance is achieved through rigorous internal controls and regular audits.
6.2 Internal Compliance Audits
- Audit Programme:
- We have established an internal audit programme to regularly assess our compliance with the ISO 27001 standard and other relevant regulations. The audit programme includes both scheduled and ad-hoc audits to ensure continuous compliance.
- Corrective Actions:
- Any non-compliance identified during audits is addressed through a structured corrective action process. This includes identifying the root cause, implementing corrective measures, and verifying their effectiveness.
7. Continuous Improvement
7.1 Monitoring and Review
- Security Performance Monitoring:
- We continuously monitor our security performance against established metrics and key performance indicators (KPIs). This includes tracking the effectiveness of security controls and the frequency of security incidents.
- Management Reviews:
- Regular management reviews are conducted to assess the overall performance of the ISMS. These reviews consider audit results, incident reports, and the effectiveness of risk treatment plans.
7.2 Security Awareness and Training
- Employee Training:
- All employees undergo mandatory security training upon joining the company, with regular refresher courses provided. Training covers topics such as phishing awareness, secure data handling, and incident reporting.
- Security Culture:
- We foster a culture of security awareness throughout the organisation. Employees are encouraged to take an active role in protecting company assets and to report any security concerns.
We Are Committed to Continuous Improvement
Cyber threats are constantly evolving, and so are our defences. We maintain a robust security culture through ongoing employee training, regular security reviews, and a commitment to continuous improvement.
Should you have any questions or require more information about our security practices, please contact us. We’re ready to answer your questions and help you feel confident about partnering with us.
How We Partner for Your Success: A Proactive Approach
Many providers measure success with simple usage data, but we go beyond that. Our approach is about customer insight and a human feedback loop. We want to be a proactive partner, not just a third-party provider you occasionally hear from.
We measure success by understanding the ‘why’ and ‘how’ behind every interaction. This allows us to:
- Actively Eliminate Friction: We analyse all possible client interactions to make your experience as seamless as possible, proactively addressing issues before they become problems.
- Human-Centric Feedback: We go beyond simple usage data to get real-time feedback and comments, which is a major point of difference that helps us continually stay ahead of the competition.
Customer-Driven Product Development
We firmly believe that customer feedback and analysis should drive product development. The data we gather from our clients directly supports customer-driven development, ensuring you are always using software that adds value to your operations.
Our development team follows the three I’s: Iterate, Improve, and Innovate. This means our product roadmap is a living document that can be changed and taken in a different direction based on your feedback, helping your business reach its goals—no matter the size or shape.
Resources to Drive Your Success
Your success depends on having the right knowledge at your fingertips. Our comprehensive resources are well-known in the industry and are designed to empower you and your team.
- Knowledge Base: Our extensive knowledge base is filled with detailed how-to videos and guides. This content is continually growing with every customer interaction, providing the building blocks for further success.
- Frequently Asked Questions: You can get answers to your most common questions immediately through our robust FAQ lists.
Ready to start your HR transformation Journey?
Book a free, no-obligation demo to see how EmployeeConnect can help you build a culture of high engagement and success.