HR & Payroll

HR software is a unified program that combines the necessary HR functions required for Human Capital Management (HCM) as well as processing Payroll and pensions all in one place. Payroll provides everything you need to track working hours, manage leave and process pay – with controlled access for employees.


  • Process weekly or monthly payroll and provide detailed payroll reports
  • HMRC Submissions directly from payroll platform
  • Mobile App access
  • Expense claim management
  • Encrypted E-payslips
  • HR dashboard
  • Employee self service
  • Auto enrolment and easy pensions filing
  • Automate reporting to spot company trends
  • Recruitment process from start to finish


  • Instantly manage, track and approve all the expenses employees claim
  • Centralise data and documents in simple to use HR system
  • Let employees securely access payslips from their mobile or computer
  • Manage holiday requests including sickness and absences
  • Training records
  • Performance management - appraisals, one-to-ones and objective setting
  • Recruitment process to 1-click conversion to employee
  • Line manager and user permissions
  • Easy Pension filing directly with Nest
  • Detailed payroll and HR reports


£6 to £15 per user

  • Free trial available

Service documents


G-Cloud 11

Service ID

1 5 2 0 3 5 7 1 6 3 7 4 5 8 7






Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Accounting and Bookkeeping
Cloud deployment model Public cloud
Service constraints No
System requirements
  • Internet browser
  • Smart phone

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within one business day.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing None
Onsite support Yes, at extra cost
Support levels We provide remote as well as on-site support with flexible fit for purpose fee structure. We provide dedicated account manager for each client.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started User will receive documentation as well as online training to use the software.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction As part of user acceptance testing (UAT), clients will test data extraction. We recommend clients to extract data as per agreed schedule for off line records. Any specific data extraction needs will be addressed as part of service delivery.
End-of-contract process Contract draft will include initial setup as well as recurring costs for client. For client's convenience, if required, contract can be open ended subject to termination as per agreed notification period. Both capex and opex price models will be available. All the costs will be agreed and documented in the contract. Any additional service beyond contract scope will be negotiated separately. Comprehensive service documentation will be developed and handed over to client. Contract termination terms will be agreed as part of the contract. We respect our client's decision to terminate the contract and will provide full support they require for handover or migration to the client or any third party.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The mobile app allows more flexibility in accessing the service, for example employees can book holidays or time off using the smart phone.
Service interface No
Customisation available Yes
Description of customisation Buyer can customise our service by either using both HR & Payroll software, or alternatively the buyer can select either the HR software only or the Payroll software only.


Independence of resources Unlimited user access to view HR and payroll information. You can also control their level of access.


Service usage metrics Yes
Metrics types Easily generate reports from the report library to spot company trends. Generate detailed reports for payroll history, bank transactions, payments, leave and more.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Reseller providing extra features and support
Organisation whose services are being resold Xero and Breathe HR

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data using a csv file.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Breathe maintains superb availability, with an average annual uptime of
greater than 99.995%.

Approach to resilience We know how important it is that you can access your HR data when and wherever you need. Servers are configured to provide an exceptionally high level of reliability and redundancy.

Outage reporting Braethe has set up status.breathehr.com with a 3rd party monitoring company so that you see for yourself.

Braethe will use reasonable endeavours to notify you in writing of the nature and extent of the force majeure event causing failure or delay in performance.


Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Restrictions in management interfaces and support channels are through user roles and permissions. This depends of the level required my management and the user.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security No
Security governance certified No
Security governance approach Protect your data with multiple layers of security. - We tightly control access to your information. - Extra security at log in. - Your personal information stays private. - Stay up-to-date with security warnings.
Information security policies and processes ISF's (Information Security Forum) flexible tools helps us to assess information risk, implement appropriate controls and focus our resources where they are most needed and to manage information risk and build cyber resilience.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our change control management and configuration management process is as follows. Project managers interested in utilising configuration management know that it is about identifying and establishing a plan before change is needed. Configuration management comes after a project baseline is set. Once the project has been defined, configuration management does the following: - Evaluates each system, resource, and component of the project. - Management who will approve or disapprove change and what processes will be utilised to configure change. - Management who will ensure changes are realised along with accountability. - Management who will implement or request the change.
Vulnerability management type Undisclosed
Vulnerability management approach The main objective of a vulnerability management process is to detect and remediate vulnerabilities in a timely fashion. A vulnerability management process consists of five phases: - Preparation - Vulnerability scan - Define remediating actions - Implement remediating actions - Rescan
Protective monitoring type Undisclosed
Protective monitoring approach The objective of protective monitoring is to provide a means to ensure that HR and Payroll logs record accurate time stamps. We are able to track each item processed and as well as receive confirmation from HMRC on payroll submission.
Incident management type Undisclosed
Incident management approach Incident reports are provided to us by third party providers and we can then pass this information to our users.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £6 to £15 per user
Discount for educational organisations No
Free trial available Yes
Description of free trial 30 days free trial and includes all features from the paid version.

Service documents

Return to top ↑